Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27150 | SRG-APP-000197 | SV-34449r1_rule | Medium |
Description |
---|
Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. |
STIG | Date |
---|---|
Application Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |