UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SSH daemon must use a FIPS 140-2 validated cryptographic module (operating in FIPS mode).


Overview

Finding ID Version Rule ID IA Controls Severity
V-23826 GEN005490 SV-28762r1_rule DCNR-1 Medium
Description
Cryptographic modules used by the system must be validated by the NIST CVMP as compliant with FIPS 140-2. Cryptography performed by modules not validated is viewed by NIST as providing no protection for the data.
STIG Date
UNIX SRG 2013-03-26

Details

Check Text ( C-29150r1_chk )
Determine if the SSH daemon uses a FIPS 140-2 validated cryptographic module (operating in FIPS mode). If it does not, this is a finding.
Fix Text (F-26161r1_fix)
Configure the SSH daemon to use a FIPS 140-2 validated cryptographic module (operating in FIPS mode).