UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must protect the confidentiality of transmitted information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37295 SRG-NET-000210-FW-000125 SV-49056r1_rule Medium
Description
This control applies to information transmitted by the firewall application. Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS), SSL VPN, or IPSEC tunnel. Without confidentiality controls, information traveling over commercial or internal networks could be viewed or compromised without detection. Firewall management traffic and other privileged communications originating from the firewall must be protected by confidentiality mechanisms while in transit (i.e., transmission encryption).
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45542r1_chk )
Open the management application.
Inspect the encryption configuration.
Verify encryption is automatically used for all data in transit.
Verify the device is configured to negotiate a key exchange before full encryption takes place when using approved cryptographic transmission algorithms.

If the system is not configured to use cryptographic mechanisms to protect information in transit, this is a finding.
Fix Text (F-42220r1_fix)
Configure the firewall implementation to protect information in transit with cryptographic mechanisms.