Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34732 | SRG-NET-000217-IDPS-NA | SV-45631r1_rule | Low |
Description |
---|
The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and to steal information. An attacker may be able to modify or corrupt a key to cause a Denial of Service. Use of approved PKI Class 3 certificates or prepositioned keying material mitigates the risk to the network of duplication or modification of cryptographic keys. Producing, controlling, and distributing asymmetric cryptographic keys is not a function of the IDPS. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42997r1_chk ) |
---|
This requirement is NA for IDPS. No fix required. |
Fix Text (F-39029r1_fix) |
---|
This requirement is NA for IDPS. No fix required. |