UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

When using locally stored user accounts, the Enterprise Voice, Video, and Messaging Session Manager must store only cryptographic representations of passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-260045 SRG-NET-000522-VVSM-00010 SV-260045r953950_rule Medium
Description
If passwords and PSKs are not encrypted when stored, they may be read if the storage location is compromised. Note that DOD requires the use two-factor, CAC-enabled authentication and the use of passwords incurs a permanent finding. Passwords should be used only in limited situations. Examples of situations where a user ID and password might be used include: - When the user does not use a CAC and is not a current DOD employee, member of the military, or DOD contractor. - When a user has been officially designated as temporarily unable to present a CAC for some reason (lost, damaged, not yet issued, broken card reader) (i.e., Temporary Exception User) and to satisfy urgent organizational needs must be temporarily permitted to use user ID/password authentication until the problem with CAC use has been remedied. - When the application is publicly available and/or hosting publicly releasable data requiring some degree of need-to-know protection. If the password is already encrypted and not a plaintext password, this meets this requirement. Implementation of this requirement requires configuration of FIPS-approved cipher block algorithm and block cipher modes for encryption. This method uses a one-way hashing encryption algorithm with a salt value to validate a user's password without having to store the actual password. Performance and time required to access are factors that must be considered, and the one-way hash is the most feasible means of securing the password and providing an acceptable measure of password security. This requirement applies to all accounts including authentication server; Authentication, Authorization, and Accounting (AAA), and local accounts, including the root account, and the account of last resort.
STIG Date
Enterprise Voice, Video, and Messaging Session Management Security Requirements Guide 2024-03-11

Details

Check Text ( C-63776r949094_chk )
Verify the Enterprise Voice, Video, and Messaging Session Manager, when using locally stored user accounts, is configured to only store cryptographic representations of passwords.

If the Enterprise Voice, Video, and Messaging Session Manager is not configured to only store cryptographic representations of passwords, this is a finding.
Fix Text (F-63683r949095_fix)
Configure the Enterprise Voice, Video, and Messaging Session Manager, when using locally stored user accounts, to only store cryptographic representations of passwords.