STIGQter STIGQter: STIG Summary: Solaris 11 X86 Security Technical Implementation Guide Version: 1 Release: 20 Benchmark Date: 24 Jan 2020: The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.

DISA Rule

SV-61047r1_rule

Vulnerability Number

V-48175

Group Title

SRG-OS-000158

Rule Version

SOL-11.1-060080

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

All remote sessions must be conducted via SSH and IPsec. Ensure that SSH and IPsec are the only protocols used.

Check Contents

All remote sessions must be conducted via encrypted services and ports.

Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding.

Vulnerability Number

V-48175

Documentable

False

Rule Version

SOL-11.1-060080

Severity Override Guidance

All remote sessions must be conducted via encrypted services and ports.

Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding.

Check Content Reference

M

Target Key

2108

Comments