STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange.

DISA Rule

SV-222641r508029_rule

Vulnerability Number

V-222641

Group Title

SRG-APP-000516

Rule Version

APSC-DV-003100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Use encryption for key exchange.

Check Contents

If the application does not implement key exchange, this check is not applicable.

Identify all application or supporting infrastructure features using key exchange.

Verify the application is using FIPS-140-2 validated cryptographic modules for encryption of keys during key exchange.

If the application does not implement encryption for key exchange, this is a finding.

Vulnerability Number

V-222641

Documentable

False

Rule Version

APSC-DV-003100

Severity Override Guidance

If the application does not implement key exchange, this check is not applicable.

Identify all application or supporting infrastructure features using key exchange.

Verify the application is using FIPS-140-2 validated cryptographic modules for encryption of keys during key exchange.

If the application does not implement encryption for key exchange, this is a finding.

Check Content Reference

M

Target Key

4093

Comments