Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27345 | SRG-NET-000165 | SV-34650r1_rule | Medium |
Description |
---|
The principle factor of PKI implementation is the private key used to encrypt or digitally sign information. If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. |
STIG | Date |
---|---|
Network Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |