CCI|CCI-002421

Title

Implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.19 APPL-14-000054UnixCIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT I
1.20 APPL-14-000057UnixCIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT I
1.24 UBTU-24-100820UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.25 UBTU-24-100830UnixCIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II
1.63 UBTU-22-255050UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.64 UBTU-22-255055UnixCIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II
1.203 RHEL-09-255010UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.204 RHEL-09-255015UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.220 RHEL-09-255090UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.265 RHEL-09-291040UnixCIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II
1.329 OL08-00-040159UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
1.330 OL08-00-040160UnixCIS Oracle Linux 8 STIG v1.0.0 CAT II
3.042 - Outgoing secure channel traffic is not signed when possible.WindowsDISA Windows Vista STIG v6r41
3.043 - Outgoing secure channel traffic is not encrypted when possible.WindowsDISA Windows Vista STIG v6r41
3.045 - The Windows SMB client is not enabled to perform SMB packet signing when possible.WindowsDISA Windows Vista STIG v6r41
3.046 - The Windows SMB server is not enabled to perform SMB packet signing when possible.WindowsDISA Windows Vista STIG v6r41
3.113 - Outgoing secure channel traffic is not encrypted or signed.WindowsDISA Windows Vista STIG v6r41
3.114 - The Windows Server SMB client is not enabled to always perform SMB packet signing.WindowsDISA Windows Vista STIG v6r41
3.115 - The Windows Server SMB server is not enabled to always perform SMB packet signing.WindowsDISA Windows Vista STIG v6r41
4.044 - The system is not configured to require a strong session key.WindowsDISA Windows Vista STIG v6r41
5.1.6 Ensure sshd Ciphers are configuredUnixCIS Rocky Linux 10 v1.0.0 L1 Workstation
5.1.6 Ensure sshd Ciphers are configuredUnixCIS Rocky Linux 10 v1.0.0 L1 Server
5.1.15 Ensure sshd MACs are configuredUnixCIS Rocky Linux 10 v1.0.0 L1 Server
5.1.15 Ensure sshd MACs are configuredUnixCIS Rocky Linux 10 v1.0.0 L1 Workstation
5.3.1 Ensure SSH is installedUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.3.1 Ensure SSH is installedUnixCIS Amazon Linux 2 STIG v2.0.0 STIG
5.3.2 Ensure SSH is runningUnixCIS Amazon Linux 2 STIG v2.0.0 STIG
5.3.2 Ensure SSH is runningUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
ALMA-09-042810 - All AlmaLinux OS 9 networked systems must implement SSH to protect the confidentiality and integrity of transmitted and received information, including information being prepared for transmission.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
ALMA-09-042920 - All AlmaLinux OS 9 networked systems must have the OpenSSH server installed.UnixDISA CloudLinux AlmaLinux OS 9 STIG v1r4
AOSX-13-000035 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - OpenSSH versionUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD currently runningUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD service disabledUnixDISA STIG Apple Mac OSX 10.14 v2r6
APPL-11-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 11 v1r8
APPL-11-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 11 v1r5
APPL-14-000054 - The macOS system must limit SSHD to FIPS-compliant connections.UnixDISA Apple macOS 14 Sonoma STIG v2r4
APPL-14-000057 - The macOS system must limit SSH to FIPS-compliant connections.UnixDISA Apple macOS 14 Sonoma STIG v2r4
APPL-15-000054 - The macOS system must limit SSHD to FIPS-compliant connections.UnixDISA Apple macOS 15 Sequoia STIG v1r5
APPL-15-000057 - The macOS system must limit SSH to FIPS-compliant connections.UnixDISA Apple macOS 15 Sequoia STIG v1r5
APPL-26-000054 - The macOS system must limit SSHD to FIPS-compliant connections.UnixDISA Apple macOS 26 Tahoe STIG v1r1
APPL-26-000057 - The macOS system must limit SSH to FIPS-compliant connections.UnixDISA Apple macOS 26 Tahoe STIG v1r1
AZLX-23-001180 - Amazon Linux 2023 must have SSH installed.UnixDISA Amazon Linux 2023 STIG v1r2
AZLX-23-001185 - Amazon Linux 2023 must implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.UnixDISA Amazon Linux 2023 STIG v1r2
AZLX-23-001195 - Amazon Linux 2023 must have the crypto-policies package installed.UnixDISA Amazon Linux 2023 STIG v1r2
AZLX-23-001225 - Amazon Linux 2023 must force a frequent session key renegotiation for SSH connections to the server.UnixDISA Amazon Linux 2023 STIG v1r2
AZLX-23-001270 - Amazon Linux 2023 must implement a FIPS 140-2/140-3 compliant systemwide cryptographic policy.UnixDISA Amazon Linux 2023 STIG v1r2
AZLX-23-001285 - Amazon Linux 2023 crypto policy must not be overridden.UnixDISA Amazon Linux 2023 STIG v1r2
Catalina - Enable SSH for Remote Access SessionsUnixNIST macOS Catalina v1.5.0 - All Profiles
DKER-EE-001050 - TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.UnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r2