Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34733 | SRG-NET-000218-IDPS-NA | SV-45632r1_rule | Low |
Description |
---|
The most secure algorithm is rendered useless if the keys cannot be kept secured. Left unprotected keys are vulnerable to duplication or modification. Duplication enables an attacker to copy a key to be used for access to the service and to steal information. An attacker may be able to modify or corrupt a key to cause a Denial of Service. Use of approved PKI certificates or prepositioned keying material mitigates the risk to the network of duplication or modification of cryptographic keys. Producing, controlling, and distributing asymmetric cryptographic keys is not a function of the IDPS. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42998r1_chk ) |
---|
This requirement is NA for IDPS. No fix required. |
Fix Text (F-39030r1_fix) |
---|
This requirement is NA for IDPS. No fix required. |