UCF STIG Viewer Logo

The operating system must produce, control, and distribute symmetric and asymmetric cryptographic keys using NSA approved key management technology and processes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33148 SRG-OS-000166-NA SV-43546r1_rule Medium
Description
Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Rationale for non-applicability: This control is being addressed by the control corresponding to CCI-1140.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41408r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37048r1_fix)
The requirement is NA. No fix is required.