Amazon Linux 2023 must implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.

STIG ID: AZLX-23-001185  |  SRG: SRG-OS-000112-GPOS-00057 |  Severity: high (CAT I)  |  CCI: CCI-001941,CCI-002418,CCI-002421,CCI-002420,CCI-002422 |  Vulnerability Id: V-274039

Vulnerability Discussion

Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions that have common application in digital signatures, checksums, and message authentication codes.

Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, operating systems need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.

Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058, SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188, SRG-OS-000425-GPOS-00189, SRG-OS-000426-GPOS-00190

Check

Verify Amazon Linux 2023 has "sshd" set to active with the following command:

$ systemctl is-active sshd
active

If the "sshd" service is not active, this is a finding.

Fix

Configure Amazon Linux 2023 to enable the sshd service run the following command:

$ sudo systemctl enable --now sshd