STIGQter STIGQter: STIG Summary: Network Device Management Security Requirements Guide Version: 4 Release: 1 Benchmark Date: 23 Apr 2021:

The network devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.

DISA Rule

SV-202117r400156_rule

Vulnerability Number

V-202117

Group Title

SRG-APP-000411

Rule Version

SRG-APP-000411-NDM-000330

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.

Check Contents

Verify the network device uses FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.

If the network device does not use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.

Vulnerability Number

V-202117

Documentable

False

Rule Version

SRG-APP-000411-NDM-000330

Severity Override Guidance

Verify the network device uses FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications.

If the network device does not use FIPS-validated HMAC to protect the integrity of nonlocal maintenance and diagnostic communications, this is a finding.

Check Content Reference

M

Target Key

2890

Comments