Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-29098 | SRG-OS-000068 | SV-37091r1_rule | Medium |
Description |
---|
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. The authenticated identity must be mapped to an account for access and authorization decisions. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2013-03-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |