SRG-OS-000250-GPOS-00093 Controls

STIG IDVersionTitleProduct
ALMA-09-002990V1R4AlmaLinux OS 9 SSH client must be configured to use only encryption ciphers employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.AlmaLinux OS 9
ALMA-09-003100V1R4AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH connections.AlmaLinux OS 9
ALMA-09-003210V1R4AlmaLinux OS 9 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms.AlmaLinux OS 9
ALMA-09-003320V1R4The AlmaLinux 9 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.AlmaLinux OS 9
ALMA-09-003430V1R4AlmaLinux OS 9 must implement DOD-approved systemwide cryptographic policies to protect the confidentiality of SSH server connections.AlmaLinux OS 9
ALMA-09-003540V1R4The AlmaLinux OS 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.AlmaLinux OS 9
ALMA-09-003760V1R4AlmaLinux OS 9 must implement DOD-approved TLS encryption in the GnuTLS package.AlmaLinux OS 9
ALMA-09-003980V1R4AlmaLinux OS 9 must implement DOD-approved encryption in the OpenSSL package.AlmaLinux OS 9
ALMA-09-004090V1R4AlmaLinux OS 9 must implement DOD-approved TLS encryption in the OpenSSL package.AlmaLinux OS 9
OL07-00-040180V3R3The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.Oracle Linux 7
OL07-00-040190V3R3The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.Oracle Linux 7
OL07-00-040200V3R3The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.Oracle Linux 7
OL07-00-040400V3R3The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.Oracle Linux 7
OL08-00-010287V2R6The OL 8 SSH daemon must be configured to use system-wide crypto policies.Oracle Linux 8
OL08-00-010293V2R6The OL 8 operating system must implement DOD-approved encryption in the OpenSSL package.Oracle Linux 8
OL08-00-010294V2R6The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.Oracle Linux 8
OL08-00-010295V2R6The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.Oracle Linux 8
OL08-00-040342V2R6OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.Oracle Linux 8
OL09-00-000252V1R3The OL 9 SSH daemon must be configured to use systemwide cryptographic policies.Oracle Linux 9
OL09-00-000254V1R3OL 9 SSH server must be configured to use only ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.Oracle Linux 9
OL09-00-000255V1R3OL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.Oracle Linux 9
OL09-00-000261V1R3OL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.Oracle Linux 9
OL09-00-000262V1R3OL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.Oracle Linux 9
RHEL-07-040180V3R9The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.Red Hat Enterprise Linux 7
RHEL-07-040190V3R9The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.Red Hat Enterprise Linux 7
RHEL-07-040200V3R9The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.Red Hat Enterprise Linux 7
RHEL-07-040400V3R9The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.Red Hat Enterprise Linux 7
RHEL-08-010290V2R5The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.Red Hat Enterprise Linux 8
RHEL-08-010291V2R5The RHEL 8 operating system must implement DOD-approved encryption to protect the confidentiality of SSH server connections.Red Hat Enterprise Linux 8
RHEL-08-010293V2R5The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.Red Hat Enterprise Linux 8
RHEL-08-010294V2R5The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.Red Hat Enterprise Linux 8
RHEL-08-010295V2R5The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.Red Hat Enterprise Linux 8
RHEL-08-010287V2R5The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.Red Hat Enterprise Linux 8
RHEL-08-040342V2R5RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.Red Hat Enterprise Linux 8
RHEL-08-010296V2R5RHEL 8 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.Red Hat Enterprise Linux 8
RHEL-08-010297V2R5RHEL 8 SSH client must be configured to use only ciphers employing FIPS 140-3 validated cryptographic hash algorithms.Red Hat Enterprise Linux 8
RHEL-09-255065V2R6The RHEL 9 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.Red Hat Enterprise Linux 9
RHEL-09-255075V2R6The RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.Red Hat Enterprise Linux 9
RHEL-09-255064V2R6The RHEL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.Red Hat Enterprise Linux 9
RHEL-09-255070V2R6The RHEL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.Red Hat Enterprise Linux 9
SLES-12-030270V3R2The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.SUSE Linux Enterprise 12
SLES-15-040450V2R4The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.SUSE Linux Enterprise 15
TOSS-04-010140V2R3The TOSS operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.Tri-Lab Operating System Stack
TOSS-04-010150V2R3The TOSS operating system must implement DoD-approved TLS encryption in the GnuTLS package.Tri-Lab Operating System Stack
TOSS-04-010160V2R3The TOSS SSH daemon must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.Tri-Lab Operating System Stack
UBTU-18-010417V2R15The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.Ubuntu 18.04
UBTU-18-010421V2R15The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.Ubuntu 18.04
UBTU-20-010045V2R3The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.Ubuntu 20.04
UBTU-22-255055V2R6Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.Ubuntu 22.04
UBTU-24-100830V1R1Ubuntu 24.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.Ubuntu 24.04
UBTU-24-100850V1R1Ubuntu 24.04 LTS must configure the SSH client to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.Ubuntu 24.04
UBTU-24-100860V1R1Ubuntu 24.04 LTS SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.Ubuntu 24.04
WN10-CC-000285V3R4The Remote Desktop Session Host must require secure RPC communications.Microsoft Windows 10
WN11-CC-000285V2R5The Remote Desktop Session Host must require secure RPC communications.Microsoft Windows 11
WN16-CC-000400V2R9The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications.Microsoft Windows Server 2016
WN16-CC-000410V2R9Remote Desktop Services must be configured with the client connection encryption set to High Level.Microsoft Windows Server 2016