UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

FIPS 140-2 validated link encryption must be used end-to-end for all data streams connecting to remote access ports of the telephone switch.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7994 DSN18.09 SV-8480r2_rule ECCT-1 ECSC-1 Low
Description
FIPS 140-2 validated encryption mechanism is used to provide security of all data streams between the management port of the DSN component and a remote management station whether connected via a modem or network. The most secure authenticated session to any remote system is accomplished via a secure connection. Encryption provides confidentiality and should be used, if possible, to secure remote access connections to DSN administration/maintenance ports.
STIG Date
Defense Switched Network (DSN) STIG 2015-08-11

Details

Check Text ( C-61961r1_chk )
Review site documentation to confirm FIPS 140-2 validated link encryption is used end-to-end for all data streams connecting to remote access ports of the telephone switch. If FIPS 140-2 validated link encryption is not used for data streams connecting to remote access ports of the telephone switch, this is a finding.
Fix Text (F-7569r2_fix)
Implement end-to-end FIPS 140-2 validated link encryption for all data streams connecting to remote access ports of the telephone switch.