Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-28910 | SRG-OS-000158 | SV-36901r1_rule | Medium |
Description |
---|
Ensuring the integrity of transmitted information requires operating systems take measures to employ some form of cryptographic mechanism in order to recognize changes to information. This is usually achieved through the use of checksums, cryptographic hash, or message authentication. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |