UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227047 GEN006575 SV-227047r505925_rule Low
Description
File integrity tools often use cryptographic hashes for verifying that file contents have not been altered. These hashes must be FIPS 140-2 approved.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2020-09-04

Details

Check Text ( C-29209r485504_chk )
If using AIDE, verify the configuration contains the sha256 or sha512 options for all monitored files and directories. Here is an example AIDE configuration fragment.

SampleRule = p+i+l+n+u+g+s+m+c+acl+xattrs+sha256
/bin SampleRule

If either the sha256 or sha512 option is not present, this is a finding.

If using a different file integrity tool, check the configuration per tool documentation.
Fix Text (F-29197r485505_fix)
If using AIDE, edit the configuration and add the sha256 or sha512 option for all monitored files and directories.

If using a different file integrity tool, configure FIPS 140-2 approved cryptographic hashes per the tool's documentation.