UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.


Overview

Finding ID Version Rule ID IA Controls Severity
V-48183 SOL-11.1-060060 SV-61055r1_rule Medium
Description
FIPS 140-2 is the current standard for validating cryptographic modules, and NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified hardware based encryption modules.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2015-08-24

Details

Check Text ( None )
None
Fix Text (F-51791r1_fix)
The Crypto Management profile is required to execute this command.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this action applies.

Enable FIPS-140 mode.

# pfexec cryptoadm enable fips-140

Reboot the system as requested.