Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-239953 | CASA-VN-000170 | SV-239953r916122_rule | Medium |
Description |
---|
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gateway must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. |
STIG | Date |
---|---|
Cisco ASA VPN Security Technical Implementation Guide | 2023-09-14 |
Check Text ( C-43186r916120_chk ) |
---|
Verify the ASA uses a NIST FIPS-validated cryptography for IKE Phase 1 as shown in the example below. crypto ikev2 policy 1 encryption aes-256 If the ASA is not configured to use NIST FIPS-validated cryptography for IKE Phase 1, this is a finding. |
Fix Text (F-43145r916121_fix) |
---|
Configure the ASA to use NIST FIPS-validated cryptography for IKE Phase 1. ASA1(config)# crypto ikev2 policy 1 ASA1(config-ikev2-policy)# encryption aes-256 |