Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-261473 | SLEM-05-671010 | SV-261473r996824_rule | High |
Description |
---|
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. SLEM 5 must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. |
STIG | Date |
---|---|
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-65202r996284_chk ) |
---|
Verify SLEM 5 is running in FIPS mode by running the following command. > cat /proc/sys/crypto/fips_enabled 1 If the value returned is "0", nothing is returned, or the file does not exist, this is a finding. |
Fix Text (F-65110r996823_fix) |
---|
To configure SLEM 5 to run in FIPS mode, add "fips=1" to the kernel parameter during SLEM 5 install. Enabling FIPS mode on a preexisting system involves a number of modifications to SLEM 5. Refer to section 9.1, "Crypto Officer Guidance", of the following document for installation guidance: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf |