STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.

DISA Rule

SV-220008r603268_rule

Vulnerability Number

V-220008

Group Title

SRG-OS-000424

Rule Version

SOL-11.1-060110

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

All remote sessions must be conducted via SSH and IPsec. Ensure that SSH and IPsec are the only protocols used.

Check Contents

All remote sessions must be conducted via encrypted services and ports.

Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding.

Vulnerability Number

V-220008

Documentable

False

Rule Version

SOL-11.1-060110

Severity Override Guidance

All remote sessions must be conducted via encrypted services and ports.

Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding.

Check Content Reference

M

Target Key

4021

Comments