CCI|CCI-000068

Title

Implement cryptographic mechanisms to protect the confidentiality of remote access sessions.

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.4 OL08-00-010020UnixCIS Oracle Linux 8 STIG v1.0.0 CAT I
1.5.9 Ensure NIST FIPS-validated cryptography is configuredUnixCIS Amazon Linux 2 STIG v2.0.0 STIG
1.5.9 Ensure NIST FIPS-validated cryptography is configured - etcUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.5.9 Ensure NIST FIPS-validated cryptography is configured - grubUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.5.9 Ensure NIST FIPS-validated cryptography is configured - procUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.5.9 Ensure NIST FIPS-validated cryptography is configured - rpmUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
1.19 APPL-14-000054UnixCIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT I
1.20 APPL-14-000057UnixCIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT I
1.24 UBTU-24-100820UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.26 UBTU-24-100840UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.63 UBTU-22-255050UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.65 UBTU-22-255060UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.220 RHEL-09-255090UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.331 OL08-00-040161UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.446 RHEL-09-671010UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT I
1.448 RHEL-09-671020UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
3.061 - Unencrypted remote access is permitted to system services.WindowsDISA Windows Vista STIG v6r41
5.1.12 Ensure sshd KexAlgorithms is configuredUnixCIS Rocky Linux 10 v1.0.0 L1 Server
5.1.12 Ensure sshd KexAlgorithms is configuredUnixCIS Rocky Linux 10 v1.0.0 L1 Workstation
5.3.16 Ensure only FIPS 140-2 ciphers are used for SSHUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.3.16 Ensure only FIPS 140-2 ciphers are used for SSHUnixCIS Amazon Linux 2 STIG v2.0.0 STIG
5.043 - Terminal Services is not configured with the client connection encryption set to the required level.WindowsDISA Windows Vista STIG v6r41
AIOS-12-001000 - Apple iOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].MDMAirWatch - DISA Apple iOS 12 v2r1
AIOS-12-001000 - Apple iOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].MDMMobileIron - DISA Apple iOS 12 v2r1
AIOS-12-001300 - Apple iOS must not include applications with the following characteristics: Siri when the device is locked.MDMAirWatch - DISA Apple iOS 12 v2r1
AIOS-12-001300 - Apple iOS must not include applications with the following characteristics: Siri when the device is locked.MDMMobileIron - DISA Apple iOS 12 v2r1
AIOS-13-001000 - Apple iOS/iPadOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].MDMMobileIron - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-001000 - Apple iOS/iPadOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].MDMAirWatch - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-001300 - Apple iOS/iPadOS must not include applications with the following characteristics: access to Siri when the device is locked.MDMMobileIron - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-001300 - Apple iOS/iPadOS must not include applications with the following characteristics: access to Siri when the device is locked.MDMAirWatch - DISA Apple iOS/iPadOS 13 v2r1
AIOS-14-001000 - Apple iOS/iPadOS must not include applications with the following characteristics: access to Siri when the device is locked.MDMAirWatch - DISA Apple iOS/iPadOS 14 v1r3
AIOS-14-001000 - Apple iOS/iPadOS must not include applications with the following characteristics: access to Siri when the device is locked.MDMMobileIron - DISA Apple iOS/iPadOS 14 v1r3
AIX7-00-002104 - The AIX SSH server must use SSH Protocol 2.UnixDISA STIG AIX 7.x v3r1
AIX7-00-003100 - The AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.UnixDISA STIG AIX 7.x v3r1
ALMA-09-003650 - AlmaLinux OS 9 must force a frequent session key renegotiation for SSH connections to the server.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
ALMA-09-003870 - AlmaLinux OS 9 IP tunnels must use FIPS 140-3 approved cryptographic algorithms.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
ALMA-09-004310 - AlmaLinux OS 9 must use the TuxCare ESU repository.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
ALMA-09-004320 - AlmaLinux OS 9 must use the TuxCare FIPS packages and not the default encryption packages.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
ALMA-09-004420 - AlmaLinux OS 9 must enable FIPS mode.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
AOSX-13-000035 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-13-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-13-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-13-000056 - The macOS system must implement an approved Key Exchange Algorithm.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - OpenSSH versionUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD currently runningUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD service disabledUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm.UnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-15-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections..UnixDISA STIG Apple Mac OSX 10.15 v1r10