UCF STIG Viewer Logo

The SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255251 SSMC-WS-010010 SV-255251r879616_rule High
Description
Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and DOD data may be compromised due to weak algorithms. FIPS 140-2 is the current standard for validating cryptographic modules and NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules. The web server must provide FIPS-compliant encryption modules when authenticating users and processes. Satisfies: SRG-APP-000179-WSR-000111, SRG-APP-000014-WSR-000006, SRG-APP-000015-WSR-000014, SRG-APP-000179-WSR-000110, SRG-APP-000224-WSR-000135, SRG-APP-000224-WSR-000136, SRG-APP-000224-WSR-000139, SRG-APP-000416-WSR-000118, SRG-APP-000439-WSR-000156, SRG-APP-000441-WSR-000181, SRG-APP-000442-WSR-000182
STIG Date
HPE 3PAR SSMC Web Server Security Technical Implementation Guide 2023-05-17

Details

Check Text ( C-58864r869920_chk )
Verify that SSMC utilizes FIPS 140-2 approved mode of encryption for authenticating users by doing the following:

1. Log on to SSMC Administrator Console on web GUI as ssmcadmin.

2. Click the information icon on top right corner and verify "FIPS mode enabled" displays "true".

3. Log on to SSMC appliance as ssmcadmin via SSH, press "X" to escape to general bash shell from the TUI menu, and issue the following command:

$ sudo /ssmc/bin/config_security.sh -o fips_mode -a status
The output of the command must read "FIPS mode is enabled".

If the observations do not indicate FIPS mode as enabled in both steps 1 and 2, this is a finding.
Fix Text (F-58808r869921_fix)
Configure SSMC to utilize FIPS 140-2 approved mode of encryption for authenticating users by doing the following:

1. Log on to the SSMC administrator console as "ssmcadmin" and enable FIPS 140-2 mode.

a. Navigate to Actions >> Preferences >> FIPS 140-2 Enabled setting and toggle the switch to "yes". Select "OK".

2. Log on as "ssmcadmin" on the appliance and enable FIPS 140-2 approved mode by doing the following:

a. Press "X" to escape to general bash shell.

b. Execute the following command:

$ sudo /ssmc/bin/config_security.sh -o fips_mode -a enable

c. Reboot the appliance when prompted.