UCF STIG Viewer Logo

The operating system must use cryptography to protect the confidentiality of remote access sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-48159 SOL-11.1-060130 SV-61031r1_rule Medium
Description
Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. Using cryptography ensures confidentiality of the remote access connections.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2019-12-18

Details

Check Text ( C-50591r1_chk )
All remote sessions must be conducted via encrypted services and ports.

Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding.
Fix Text (F-51767r2_fix)
All remote sessions must be conducted via SSH and IPsec. Ensure that SSH and IPsec are the only protocols used.