STIGQter STIGQter: STIG Summary: Network Device Management Security Requirements Guide Version: 4 Release: 1 Benchmark Date: 23 Apr 2021:

The network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.

DISA Rule

SV-202072r397606_rule

Vulnerability Number

V-202072

Group Title

SRG-APP-000179

Rule Version

SRG-APP-000179-NDM-000265

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to use FIPS 140-2 approved algorithms for authentication to a cryptographic module.

Check Contents

Determine if the network device uses FIPS 140-2 approved algorithms for authentication to a cryptographic module.

If the network device is not configured to use a FIPS-approved authentication algorithm to a cryptographic module, this is a finding.

Vulnerability Number

V-202072

Documentable

False

Rule Version

SRG-APP-000179-NDM-000265

Severity Override Guidance

Determine if the network device uses FIPS 140-2 approved algorithms for authentication to a cryptographic module.

If the network device is not configured to use a FIPS-approved authentication algorithm to a cryptographic module, this is a finding.

Check Content Reference

M

Target Key

2890

Comments