3.077 - The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

Information

This setting ensures that the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government and should be the algorithms used for all OS encryption functions.

Solution

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2008_R2_MS_V1R33_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-002450, Rule-ID|SV-32342r1_rule, STIG-ID|3.077, Vuln-ID|V-3383

Plugin: Windows

Control ID: da0b1ce7078e248efac9c5d5a0ce50575ec08d820eb0b81ec973c7e5720139d9