SRG-OS-000033-GPOS-00014 Controls

STIG ID Version Title Product
ALMA-09-003650 V1R1 AlmaLinux OS 9 must force a frequent session key renegotiation for SSH connections to the server.
ALMA-09-003870 V1R1 AlmaLinux OS 9 IP tunnels must use FIPS 140-3 approved cryptographic algorithms.
ALMA-09-004310 V1R1 AlmaLinux OS 9 must use the TuxCare FIPS repository.
ALMA-09-004320 V1R1 AlmaLinux OS 9 must use the TuxCare FIPS packages and not the default encryption packages.
ALMA-09-004420 V1R1 AlmaLinux OS 9 must enable FIPS mode.
APPL-14-000054 V2R2 The macOS system must limit SSHD to FIPS-compliant connections.
APPL-14-000057 V2R2 The macOS system must limit SSH to FIPS-compliant connections.
OL07-00-021350 V3R1 The Oracle Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
OL07-00-040110 V3R1 The Oracle Linux 7 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.
OL07-00-040712 V3R1 The Oracle Linux operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
OL08-00-010020 V2R2 OL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
OL08-00-040161 V2R2 OL 8 must force a frequent session key renegotiation for SSH connections to the server.
RHEL-07-021350 V3R9 The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
RHEL-07-040110 V3R9 The Red Hat Enterprise Linux 7 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.
RHEL-08-010020 V2R1 RHEL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
RHEL-08-040161 V2R1 RHEL 8 must force a frequent session key renegotiation for SSH connections to the server.
RHEL-09-671010 V2R2 RHEL 9 must enable FIPS mode.
RHEL-09-671020 V2R2 RHEL 9 IP tunnels must use FIPS 140-2/140-3 approved cryptographic algorithms.
SLES-12-030170 V3R1 The SUSE operating system must implement DoD-approved encryption to protect the confidentiality of SSH remote connections.
SLES-15-010160 V2R2 The SUSE operating system must implement DOD-approved encryption to protect the confidentiality of SSH remote connections.
UBTU-18-010411 V2R15 The Ubuntu operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
UBTU-22-255050 V2R2 Ubuntu 22.04 LTS must configure the SSH daemon to use FIPSĀ 140-3-approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-22-255060 V2R2 Ubuntu 22.04 LTS SSH server must be configured to use only FIPS-validated key exchange algorithms.
WN10-CC-000290 V3R2 Remote Desktop Services must be configured with the client connection encryption set to the required level.
WN11-CC-000290 V2R2 Remote Desktop Services must be configured with the client connection encryption set to the required level.
WN16-SO-000430 V2R9 Windows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
WN19-CC-000370 V3R2 Windows Server 2019 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.
WN19-CC-000380 V3R2 Windows Server 2019 Remote Desktop Services must be configured with the client connection encryption set to High Level.
WN22-CC-000370 V2R2 Windows Server 2022 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.
WN22-CC-000380 V2R2 Windows Server 2022 Remote Desktop Services must be configured with the client connection encryption set to High Level.