CCI|CCI-002421

Title

Implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.

Reference Item Details

Category: 2024

Audit Items

View all Reference Audit Items

NamePluginAudit Name
3.042 - Outgoing secure channel traffic is not signed when possible.WindowsDISA Windows Vista STIG v6r41
3.043 - Outgoing secure channel traffic is not encrypted when possible.WindowsDISA Windows Vista STIG v6r41
3.045 - The Windows SMB client is not enabled to perform SMB packet signing when possible.WindowsDISA Windows Vista STIG v6r41
3.046 - The Windows SMB server is not enabled to perform SMB packet signing when possible.WindowsDISA Windows Vista STIG v6r41
3.113 - Outgoing secure channel traffic is not encrypted or signed.WindowsDISA Windows Vista STIG v6r41
3.114 - The Windows Server SMB client is not enabled to always perform SMB packet signing.WindowsDISA Windows Vista STIG v6r41
3.115 - The Windows Server SMB server is not enabled to always perform SMB packet signing.WindowsDISA Windows Vista STIG v6r41
4.044 - The system is not configured to require a strong session key.WindowsDISA Windows Vista STIG v6r41
5.3.1 Ensure SSH is installedUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.3.2 Ensure SSH is runningUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AOSX-13-000035 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission.UnixDISA STIG Apple Mac OSX 10.13 v2r5
APPL-11-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 11 v1r8
APPL-11-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 11 v1r5
APPL-15-000054 - The macOS system must limit SSHD to FIPS-compliant connections.UnixDISA Apple macOS 15 (Sequoia) STIG v1r1
Catalina - Enable SSH for Remote Access SessionsUnixNIST macOS Catalina v1.5.0 - All Profiles
EX13-CA-000155 - Exchange OWA must have S/MIME Certificates enabled.WindowsDISA Microsoft Exchange 2013 Client Access Server STIG v2r2
O121-C1-019700 - The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.UnixDISA STIG Oracle 12c v3r2 Linux
O121-C1-019700 - The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.WindowsDISA STIG Oracle 12c v3r2 Windows
OL6-00-000293 - Wireless network adapters must be disabled.UnixDISA STIG Oracle Linux 6 v2r7
OL07-00-041010 - The Oracle Linux operating system must be configured so that all wireless network adapters are disabled.UnixDISA Oracle Linux 7 STIG v3r1
OL08-00-040159 - All OL 8 networked systems must have SSH installed.UnixDISA Oracle Linux 8 STIG v2r2
OL08-00-040160 - All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.UnixDISA Oracle Linux 8 STIG v2r2
RHEL-07-040300 - The Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.UnixDISA Red Hat Enterprise Linux 7 STIG v3r15
RHEL-07-040310 - The Red Hat Enterprise Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.UnixDISA Red Hat Enterprise Linux 7 STIG v3r15
RHEL-09-255010 - All RHEL 9 networked systems must have SSH installed.UnixDISA Red Hat Enterprise Linux 9 STIG v2r2
RHEL-09-255015 - All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.UnixDISA Red Hat Enterprise Linux 9 STIG v2r2
RHEL-09-291040 - RHEL 9 wireless network adapters must be disabled.UnixDISA Red Hat Enterprise Linux 9 STIG v2r2
SOL-11.1-060080 - The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 SPARC v3r1
SOL-11.1-060080 - The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 X86 v3r1
SOL-11.1-060110 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 X86 v3r1
SOL-11.1-060110 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 SPARC v3r1
UBTU-16-030420 - All networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission - installedUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-030420 - All networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission - runningUnixDISA STIG Ubuntu 16.04 LTS v2r3
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.WindowsDISA IBM WebSphere Traditional 9 Windows STIG v1r1
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.UnixDISA IBM WebSphere Traditional 9 STIG v1r1
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.UnixDISA IBM WebSphere Traditional 9 STIG v1r1 Middleware
WINER-000008 - The system must be configured to use SSL to forward error reports.WindowsDISA Windows Vista STIG v6r41
WN10-SO-000035 - Outgoing secure channel traffic must be encrypted or signed.WindowsDISA Windows 10 STIG v3r2
WN10-SO-000040 - Outgoing secure channel traffic must be encrypted when possible.WindowsDISA Windows 10 STIG v3r2
WN10-SO-000045 - Outgoing secure channel traffic must be signed when possible.WindowsDISA Windows 10 STIG v3r2
WN10-SO-000060 - The system must be configured to require a strong session key.WindowsDISA Windows 10 STIG v3r2
WN10-SO-000100 - The Windows SMB client must be configured to always perform SMB packet signing.WindowsDISA Windows 10 STIG v3r2
WN10-SO-000120 - The Windows SMB server must be configured to always perform SMB packet signing.WindowsDISA Windows 10 STIG v3r2
WN11-00-000015 - Windows 11 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.WindowsDISA Windows 11 STIG v2r2
WN11-00-000020 - Secure Boot must be enabled on Windows 11 systems.WindowsDISA Windows 11 STIG v2r2
WN11-SO-000035 - Outgoing secure channel traffic must be encrypted or signed.WindowsDISA Windows 11 STIG v2r2
WN11-SO-000040 - Outgoing secure channel traffic must be encrypted.WindowsDISA Windows 11 STIG v2r2
WN11-SO-000045 - Outgoing secure channel traffic must be signed.WindowsDISA Windows 11 STIG v2r2
WN12-SO-000012 - Outgoing secure channel traffic must be encrypted or signed.WindowsDISA Windows Server 2012 and 2012 R2 MS STIG v3r7
WN12-SO-000012 - Outgoing secure channel traffic must be encrypted or signed.WindowsDISA Windows Server 2012 and 2012 R2 DC STIG v3r7