SRG-OS-000250-GPOS-00093 Controls

STIG ID Version Title Product
OL07-00-040180 V3R1 The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
OL07-00-040190 V3R1 The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040200 V3R1 The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040400 V3R1 The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
OL08-00-010287 V2R2 The OL 8 SSH daemon must be configured to use system-wide crypto policies.
OL08-00-010293 V2R2 The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
OL08-00-010294 V2R2 The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
OL08-00-010295 V2R2 The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
OL08-00-040342 V2R2 OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
RHEL-07-040180 V3R9 The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
RHEL-07-040190 V3R9 The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040200 V3R9 The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040400 V3R9 The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
RHEL-08-010290 V2R1 The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
RHEL-08-010291 V2R1 The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections.
RHEL-08-010293 V2R1 The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
RHEL-08-010294 V2R1 The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
RHEL-08-010295 V2R1 The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
RHEL-08-010287 V2R1 The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.
RHEL-08-040342 V2R1 RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
RHEL-09-255055 V2R2 RHEL 9 SSH daemon must be configured to use system-wide crypto policies.
RHEL-09-255060 V2R2 RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.
RHEL-09-255065 V2R2 RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections.
RHEL-09-255075 V2R2 RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
RHEL-09-672030 V2R2 RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.
RHEL-09-672035 V2R2 RHEL 9 must implement DOD-approved encryption in the OpenSSL package.
RHEL-09-672040 V2R2 RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.
SLES-12-030270 V3R1 The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
SLES-15-040450 V2R2 The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-18-010417 V2R15 The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.
UBTU-18-010421 V2R15 The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-20-010045 V2R1 The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-22-255055 V2R2 Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
WN10-CC-000285 V3R2 The Remote Desktop Session Host must require secure RPC communications.
WN11-CC-000285 V2R2 The Remote Desktop Session Host must require secure RPC communications.
WN16-CC-000400 V2R9 The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications.
WN16-CC-000410 V2R9 Remote Desktop Services must be configured with the client connection encryption set to High Level.