SRG-OS-000250-GPOS-00093 Controls

STIG IDVersionTitleProduct
ALMA-09-002990V1R2AlmaLinux OS 9 SSH client must be configured to use only encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
ALMA-09-003100V1R2AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.
ALMA-09-003210V1R2AlmaLinux OS 9 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
ALMA-09-003320V1R2AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections.
ALMA-09-003325V1R2AlmaLinux OS 9 SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms.
ALMA-09-003430V1R2AlmaLinux OS 9 must implement DOD-approved systemwide cryptographic policies to protect the confidentiality of SSH server connections.
ALMA-09-003540V1R2AlmaLinux OS 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
ALMA-09-003760V1R2AlmaLinux OS 9 must implement DOD-approved TLS encryption in the GnuTLS package.
ALMA-09-003980V1R2AlmaLinux OS 9 must implement DOD-approved encryption in the OpenSSL package.
ALMA-09-004090V1R2AlmaLinux OS 9 must implement DOD-approved TLS encryption in the OpenSSL package.
OL07-00-040180V3R2The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
OL07-00-040190V3R2The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040200V3R2The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040400V3R2The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
OL08-00-010287V2R4The OL 8 SSH daemon must be configured to use system-wide crypto policies.
OL08-00-010293V2R4The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
OL08-00-010294V2R4The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
OL08-00-010295V2R4The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
OL08-00-040342V2R4OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
OL09-00-000252V1R1The OL 9 SSH daemon must be configured to use systemwide cryptographic policies.
OL09-00-000254V1R1OL 9 SSH server must be configured to use only ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
OL09-00-000255V1R1OL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
OL09-00-000261V1R1OL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
OL09-00-000262V1R1OL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
RHEL-07-040180V3R9The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
RHEL-07-040190V3R9The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040200V3R9The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040400V3R9The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
RHEL-08-010290V2R3The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
RHEL-08-010291V2R3The RHEL 8 operating system must implement DOD-approved encryption to protect the confidentiality of SSH server connections.
RHEL-08-010293V2R3The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
RHEL-08-010294V2R3The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
RHEL-08-010295V2R3The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
RHEL-08-010287V2R3The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.
RHEL-08-040342V2R3RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
RHEL-08-010296V2R3RHEL 8 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
RHEL-08-010297V2R3RHEL 8 SSH client must be configured to use only ciphers employing FIPS 140-3 validated cryptographic hash algorithms.
RHEL-09-255055V2R4RHEL 9 SSH daemon must be configured to use system-wide crypto policies.
RHEL-09-255060V2R4RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH connections.
RHEL-09-255065V2R4The RHEL 9 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
RHEL-09-255075V2R4The RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
RHEL-09-255064V2R4The RHEL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
RHEL-09-255070V2R4The RHEL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
SLES-12-030270V3R2The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
SLES-15-040450V2R4The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-18-010417V2R15The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.
UBTU-18-010421V2R15The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-20-010045V2R1The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-22-255055V2R4Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100830V1R1Ubuntu 24.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100850V1R1Ubuntu 24.04 LTS must configure the SSH client to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100860V1R1Ubuntu 24.04 LTS SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
WN10-CC-000285V3R4The Remote Desktop Session Host must require secure RPC communications.
WN11-CC-000285V2R3The Remote Desktop Session Host must require secure RPC communications.
WN16-CC-000400V2R9The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications.
WN16-CC-000410V2R9Remote Desktop Services must be configured with the client connection encryption set to High Level.