STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AC-17 (2) — Remote Access

CCI-000068

Definition

Implement cryptographic mechanisms to protect the confidentiality of remote access sessions.

Parent Control

AC-17 (2)Remote AccessAccess Control

Linked STIG Checks (200)

V-237032CAT IIThe A10 Networks ADC, when used for TLS encryption and decryption, must be configured to comply with the required TLS settings in NIST SP 800-52.A10 Networks ADC ALG Security Technical Implementation GuideV-279094CAT IColdFusion must remove all export ciphers to protect the confidentiality and integrity of transmitted information.Adobe ColdFusion Security Technical Implementation GuideV-76401CAT IKona Site Defender that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-274046CAT IAmazon Linux 2023 must force a frequent session key renegotiation for SSH connections to the server.Amazon Linux 2023 Security Technical Implementation GuideV-274057CAT IAmazon Linux 2023 must enable FIPS mode.Amazon Linux 2023 Security Technical Implementation GuideV-283441CAT IAmazon Linux 2023 must enable FIPS mode.Amazon Linux 2023 Security Technical Implementation GuideV-268089CAT INixOS must implement DOD-approved encryption to protect the confidentiality of remote access sessions.Anduril NixOS Security Technical Implementation GuideV-214230CAT IIThe Apache web server must use cryptography to protect the integrity of remote sessions.Apache Server 2.4 UNIX Server Security Technical Implementation GuideV-214278CAT IIThe Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.Apache Server 2.4 UNIX Site Security Technical Implementation GuideV-214308CAT IIThe Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.Apache Server 2.4 Windows Server Security Technical Implementation GuideV-267937CAT IIIApple iOS/iPadOS 18 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: on a per-app basis, on a per-group of applications processes basis].Apple iOS/iPadOS 18 Security Technical Implementation GuideV-278697CAT IIIApple iOS/iPadOS 26 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: on a per-app basis, on a per-group of applications processes basis].Apple iOS/iPadOS 26 Security Technical Implementation GuideV-252459CAT IThe macOS system must implement approved ciphers within the SSH server configuration to protect the confidentiality of SSH connections.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-252460CAT IThe macOS system must implement approved Message Authentication Codes (MACs) within the SSH server configuration.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-252461CAT IThe macOS system must implement approved Key Exchange Algorithms within the SSH server configuration.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257773CAT IThe macOS system must implement approved ciphers within the SSH client configuration to protect the confidentiality of SSH connections.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257774CAT IThe macOS system must implement approved Message Authentication Codes (MACs) within the SSH client configuration.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257775CAT IThe macOS system must implement approved Key Exchange Algorithms within the SSH client configuration.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257165CAT IThe macOS system must implement approved ciphers within the SSH server configuration to protect the confidentiality of SSH connections.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-257166CAT IThe macOS system must implement approved Message Authentication Codes (MACs) within the SSH server configuration.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-257167CAT IThe macOS system must implement approved Key Exchange Algorithms within the SSH server configuration.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-257293CAT IThe macOS system must implement approved ciphers within the SSH client configuration to protect the confidentiality of SSH connections.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-257294CAT IThe macOS system must implement approved Message Authentication Codes (MACs) within the SSH client configuration.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-257295CAT IThe macOS system must implement approved Key Exchange Algorithms within the SSH client configuration.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-259438CAT IThe macOS system must limit SSHD to FIPS-compliant connections.Apple macOS 14 (Sonoma) Security Technical Implementation GuideV-259439CAT IThe macOS system must limit SSH to FIPS-compliant connections.Apple macOS 14 (Sonoma) Security Technical Implementation GuideV-268438CAT IThe macOS system must limit SSHD to FIPS-compliant connections.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268439CAT IThe macOS system must limit SSH to FIPS-compliant connections.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277046CAT IThe macOS system must limit SSHD to FIPS-compliant connections.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277047CAT IThe macOS system must limit SSH to FIPS-compliant connections.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-276374CAT IIIApple visionOS 2 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: on a per-app basis, on a per-group of applications processes basis].Apple visionOS 2 Security Technical Implementation GuideV-282783CAT IIIApple visionOS 26 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: on a per-app basis, on a per-group of applications processes basis].Apple visionOS 26 Security Technical Implementation GuideV-204924CAT IIThe ALG providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.Application Layer Gateway Security Requirements GuideV-204925CAT IIThe ALG that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.Application Layer Gateway Security Requirements GuideV-204926CAT IIThe ALG that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.Application Layer Gateway Security Requirements GuideV-274497CAT IIThe API must encrypt data in transit.Application Programming Interface (API) Security Requirements GuideV-222396CAT IIThe application must implement DoD-approved encryption to protect the confidentiality of remote access sessions.Application Security and Development Security Technical Implementation GuideV-222399CAT IMessages protected with WS_Security must use time stamps with creation and expiration times.Application Security and Development Security Technical Implementation GuideV-222400CAT IValidity periods must be verified on all application messages using WS-Security or SAML assertions.Application Security and Development Security Technical Implementation GuideV-222401CAT IIThe application must ensure each unique asserting party provides unique assertion ID references for each SAML assertion.Application Security and Development Security Technical Implementation GuideV-222402CAT IIThe application must ensure encrypted assertions, or equivalent confidentiality protections are used when assertion data is passed through an intermediary, and confidentiality of the assertion data is required when passing through the intermediary.Application Security and Development Security Technical Implementation GuideV-222403CAT IThe application must use the NotOnOrAfter condition when using the SubjectConfirmation element in a SAML assertion.Application Security and Development Security Technical Implementation GuideV-222404CAT IThe application must use both the NotBefore and NotOnOrAfter elements or OneTimeUse element when using the Conditions element in a SAML assertion.Application Security and Development Security Technical Implementation GuideV-222405CAT IIThe application must ensure if a OneTimeUse element is used in an assertion, there is only one of the same used in the Conditions element portion of an assertion.Application Security and Development Security Technical Implementation GuideV-222406CAT IIThe application must ensure messages are encrypted when the SessionIndex is tied to privacy data.Application Security and Development Security Technical Implementation GuideV-204709CAT IIThe application server must use encryption strength in accordance with the categorization of the management data during remote access management sessions.Application Server Security Requirements GuideV-237329CAT IThe ArcGIS Server must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.ArcGIS for Server 10.3 Security Technical Implementation GuideV-272629CAT ICylanceON-PREM must be configured to use TLS 1.2 or higher.Arctic Wolf CylanceON-PREM Security Technical Implementation GuideV-256841CAT ICompliance Guardian must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.AvePoint Compliance Guardian Security Technical Implementation GuideV-253512CAT IDocAve must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.AvePoint DocAve 6 Security Technical Implementation GuideV-276004CAT IAx-OS must implement DOD-approved encryption to protect the confidentiality of remote access sessions.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-79023CAT IThe BlackBerry Enterprise Mobility Server (BEMS) must be configured to use HTTPS.BlackBerry Enterprise Mobility Server 2.x Security Technical Implementation GuideV-79033CAT IIIf the Mail service (Push Notifications support for BlackBerry Work) is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to Enable SSL LDAP when using LDAP Lookup for users.BlackBerry Enterprise Mobility Server 2.x Security Technical Implementation GuideV-79035CAT IIIf the Mail service (Push Notifications support for BlackBerry Work) is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to Enable SSL LDAP for certificate directory lookup.BlackBerry Enterprise Mobility Server 2.x Security Technical Implementation GuideV-254716CAT IThe BlackBerry Enterprise Mobility Server (BEMS) must be configured to use HTTPS.BlackBerry Enterprise Mobility Server 3.x Security Technical Implementation GuideV-254721CAT IIIf the Mail service (Push Notifications support for BlackBerry Work) is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to Enable SSL LDAP when using LDAP Lookup for users.BlackBerry Enterprise Mobility Server 3.x Security Technical Implementation GuideV-254722CAT IIIf the Mail service (Push Notifications support for BlackBerry Work) is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to Enable SSL LDAP for certificate directory lookup.BlackBerry Enterprise Mobility Server 3.x Security Technical Implementation GuideV-237349CAT IIThe CA API Gateway providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.CA API Gateway ALG Security Technical Implementation GuideV-237350CAT IIThe CA API Gateway that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.CA API Gateway ALG Security Technical Implementation GuideV-237351CAT IIThe CA API Gateway that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.CA API Gateway ALG Security Technical Implementation GuideV-219307CAT IIThe Ubuntu operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.Canonical Ubuntu 18.04 LTS Security Technical Implementation GuideV-255906CAT IIThe Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.Canonical Ubuntu 18.04 LTS Security Technical Implementation GuideV-238217CAT IIThe Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.Canonical Ubuntu 20.04 LTS Security Technical Implementation GuideV-255912CAT IIThe Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.Canonical Ubuntu 20.04 LTS Security Technical Implementation GuideV-260531CAT IIUbuntu 22.04 LTS must configure the SSH daemon to use FIPS 140-3-approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-260533CAT IIUbuntu 22.04 LTS SSH server must be configured to use only FIPS-validated key exchange algorithms.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-270667CAT IIUbuntu 24.04 LTS must configure the SSH daemon to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-270669CAT IIUbuntu 24.04 LTS SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-239957CAT IThe Cisco ASA must be configured to use a Diffie-Hellman (DH) Group of 16 or greater for Internet Key Exchange (IKE) Phase 1.Cisco ASA VPN Security Technical Implementation GuideV-239975CAT IThe Cisco ASA remote access VPN server must be configured to use TLS 1.2 or higher to protect the confidentiality of remote access connections.Cisco ASA VPN Security Technical Implementation GuideV-239979CAT IThe Cisco VPN remote access server must be configured to use AES256 or greater encryption for the Internet Key Exchange (IKE) Phase 1 to protect confidentiality of remote access sessions.Cisco ASA VPN Security Technical Implementation GuideV-239980CAT IThe Cisco ASA VPN remote access server must be configured to use AES256 or greater encryption for the IPsec security association to protect the confidentiality of remote access sessions.Cisco ASA VPN Security Technical Implementation GuideV-215697CAT IIThe Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Cisco IOS Router NDM Security Technical Implementation GuideV-220605CAT IIThe Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Cisco IOS Switch NDM Security Technical Implementation GuideV-215842CAT IIThe Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Cisco IOS XE Router NDM Security Technical Implementation GuideV-220553CAT IIThe Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Cisco IOS XE Switch NDM Security Technical Implementation GuideV-216539CAT IIThe Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Cisco IOS XR Router NDM Security Technical Implementation GuideV-242575CAT IThe Cisco ISE must use TLS 1.2, at a minimum, to protect the confidentiality of information passed between the endpoint agent and the Cisco ISE. This is This is required for compliance with C2C Step 1.Cisco ISE NAC Security Technical Implementation GuideV-220501CAT IIThe Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Cisco NX OS Switch NDM Security Technical Implementation GuideV-234565CAT ICitrix Delivery Controller must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Delivery Controller Security Technical Implementation GuideV-234222CAT ICitrix License Server must implement DoD-approved encryption to protect the confidentiality of remote access sessions.Citrix Virtual Apps and Desktop 7.x License Server Security Technical Implementation GuideV-234257CAT ICitrix Linux Virtual Delivery Agent must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Linux Virtual Delivery Agent Security Technical Implementation GuideV-234251CAT IThe Citrix Storefront server must implement DoD-approved encryption to protect the confidentiality of remote access sessions.Citrix Virtual Apps and Desktop 7.x StoreFront Security Technical Implementation GuideV-234253CAT ICitrix Windows Virtual Delivery Agent must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Windows Virtual Delivery Agent Security Technical Implementation GuideV-213200CAT IXenDesktop License Server must implement DoD-approved encryption to protect the confidentiality of remote access sessions.Citrix XenDesktop 7.x License Server Security Technical Implementation GuideV-213208CAT ICitrix Receiver must implement DoD-approved encryption.Citrix XenDesktop 7.x Receiver Security Technical Implementation GuideV-213213CAT ICitrix Windows Virtual Delivery Agent must implement DoD-approved encryption.Citrix XenDesktop 7.x Windows VDA Security Technical Implementation GuideV-81433CAT ICitrix Windows Virtual Delivery Agent must implement DoD-approved encryption.Citrix XenDesktop 7.x Windows Virtual Delivery Agent Security Technical Implementation GuideV-269120CAT IIAlmaLinux OS 9 must force a frequent session key renegotiation for SSH connections to the server.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269122CAT IAlmaLinux OS 9 IP tunnels must use FIPS 140-3 approved cryptographic algorithms.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269125CAT IAlmaLinux OS 9 must use the TuxCare ESU repository.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269126CAT IAlmaLinux OS 9 must use the TuxCare FIPS packages and not the default encryption packages.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269127CAT IAlmaLinux OS 9 must enable FIPS mode.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-233015CAT IIThe container platform must use TLS 1.2 or greater for secure container image transport from trusted sources.Container Platform Security Requirements GuideV-233016CAT IIThe container platform must use TLS 1.2 or greater for secure communication.Container Platform Security Requirements GuideV-235776CAT IITCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-235777CAT IFIPS mode must be enabled on all Docker Engine - Enterprise nodes.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-259995CAT IThe Enterprise Voice, Video, and Messaging Session Manager must use TLS 1.2 or greater to protect the confidentiality of remote access.Enterprise Voice, Video, and Messaging Session Management Security Requirements GuideV-215746CAT IIThe BIG-IP Core implementation must be configured to use encryption services that implement NIST SP 800-52 Revision 2 compliant cryptography to protect the confidentiality of connections to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215747CAT IIThe BIG-IP Core implementation must be configured to comply with the required TLS settings in NIST SP 800-52 Revision 1 for TLS services to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-266139CAT IThe F5 BIG-IP appliance providing intermediary services for remote access must use FIPS-validated cryptographic algorithms, including TLS 1.2 at a minimum.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-266277CAT IThe F5 BIG-IP appliance must be configured to use a Diffie-Hellman (DH) Group of 16 or greater for Internet Key Exchange (IKE) Phase 1.F5 BIG-IP TMOS VPN Security Technical Implementation GuideV-266278CAT IThe F5 BIG-IP appliance IPsec VPN Gateway must use AES256 or higher encryption for the Internet Key Exchange (IKE) proposal to protect confidentiality of remote access sessions.F5 BIG-IP TMOS VPN Security Technical Implementation GuideV-266279CAT IThe F5 BIG-IP appliance IPsec VPN must use AES256 or greater encryption for the IPsec proposal.F5 BIG-IP TMOS VPN Security Technical Implementation GuideV-278381CAT INGINX must use TLS 1.2, at a minimum, to protect data confidentiality using remote access.F5 NGINX Security Technical Implementation GuideV-233332CAT IIForescout must use TLS 1.2, at a minimum, to protect the confidentiality of information passed between the endpoint agent and Forescout for the purposes of client posture assessment. This is required for compliance with C2C Step 1.Forescout Network Access Control Security Technical Implementation GuideV-233334CAT IICommunications between Forescout endpoint agent and the switch must transmit access authorization information via a protected path using a cryptographic mechanism. This is required for compliance with C2C Step 1.Forescout Network Access Control Security Technical Implementation GuideV-233340CAT IWhen connecting with endpoints, Forescout must be configured to use FIPS 140-2/3 validated algorithms for encryption processes and communications. This is required for compliance with C2C Step 1.Forescout Network Access Control Security Technical Implementation GuideV-203603CAT IThe operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.General Purpose Operating System Security Requirements GuideV-255251CAT IThe SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.HPE 3PAR SSMC Web Server Security Technical Implementation GuideV-255253CAT ISSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.HPE 3PAR SSMC Web Server Security Technical Implementation GuideV-237818CAT IDoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.HPE 3PAR StoreServ 3.2.x Security Technical Implementation GuideV-255272CAT IThe HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.HPE 3PAR StoreServ 3.3.x Security Technical Implementation GuideV-255291CAT IThe HPE 3PAR OS CIMserver process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.HPE 3PAR StoreServ 3.3.x Security Technical Implementation GuideV-255295CAT IThe HPE 3PAR OS WSAPI process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.HPE 3PAR StoreServ 3.3.x Security Technical Implementation GuideV-266983CAT IIAOS, when used as a VPN Gateway, must be configured to use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions.HPE Aruba Networking AOS VPN Security Technical Implementation GuideV-266985CAT IAOS, when used as an IPsec VPN Gateway, must use Advanced Encryption Standard (AES) encryption for the Internet Key Exchange (IKE) proposal to protect confidentiality of remote access sessions.HPE Aruba Networking AOS VPN Security Technical Implementation GuideV-266557CAT IIAOS must use Transport Layer Security (TLS) 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-215289CAT IIThe AIX SSH server must use SSH Protocol 2.IBM AIX 7.x Security Technical Implementation GuideV-215402CAT IIThe AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.IBM AIX 7.x Security Technical Implementation GuideV-252562CAT IThe IBM Aspera Console feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252587CAT IThe IBM Aspera Faspex feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252604CAT IThe IBM Aspera Shares feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252613CAT IThe IBM Aspera High-Speed Transfer Endpoint must be configured to comply with the required TLS settings in NIST SP 800-52.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252616CAT IThe IBM Aspera High-Speed Transfer Endpoint must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252627CAT IThe IBM Aspera High-Speed Transfer Server must be configured to comply with the required TLS settings in NIST SP 800-52.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252630CAT IThe IBM Aspera High-Speed Transfer Server must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252634CAT IIThe IBM Aspera High-Speed Transfer Server must enable the use of dynamic token encryption keys.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-65201CAT IIThe DataPower Gateway providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.IBM DataPower ALG Security Technical Implementation GuideV-65203CAT IIThe DataPower Gateway that stores secret or private keys must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.IBM DataPower ALG Security Technical Implementation GuideV-65205CAT IIThe DataPower Gateway that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.IBM DataPower ALG Security Technical Implementation GuideV-255816CAT IIThe MQ Appliance messaging server must use encryption strength in accordance with the categorization of the management data during remote access management sessions.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-250323CAT IIThe WebSphere Liberty Server Quality of Protection (QoP) must be set to use TLSv1.2 or higher.IBM WebSphere Liberty Server Security Technical Implementation GuideV-250341CAT IApplication security must be enabled on the WebSphere Liberty Server.IBM WebSphere Liberty Server Security Technical Implementation GuideV-255829CAT IIThe WebSphere Application Server Quality of Protection (QoP) must be set to use TLSv1.2 or higher.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-255830CAT IThe WebSphere Application Server global application security must be enabled.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-255831CAT IThe WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-223589CAT IIBM z/OS SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm.IBM z/OS ACF2 Security Technical Implementation GuideV-223610CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS ACF2 Security Technical Implementation GuideV-223807CAT IThe IBM RACF SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm to protect confidential information and remote access sessions.IBM z/OS RACF Security Technical Implementation GuideV-223831CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS RACF Security Technical Implementation GuideV-224044CAT IThe SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm.IBM z/OS TSS Security Technical Implementation GuideV-224067CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS TSS Security Technical Implementation GuideV-237906CAT IIThe IBM z/VM TCP/IP configuration must include an SSLSERVERID statement.IBM zVM Using CA VM:Secure Security Technical Implementation GuideV-224762CAT IIThe ISEC7 SPHERE must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.ISEC7 Sphere Security Technical Implementation GuideV-258586CAT IThe ICS must be configured to use TLS 1.2, at a minimum.Ivanti Connect Secure VPN Security Technical Implementation GuideV-251011CAT IIThe Sentry providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation GuideV-251012CAT IIIf Sentry stores secret or private keys, it must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation GuideV-251013CAT IIThe Sentry that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation GuideV-251011CAT IIThe Sentry providing intermediary services for remote access communications traffic must use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.Ivanti Sentry 9.x ALG Security Technical Implementation GuideV-251012CAT IIIf Sentry stores secret or private keys, it must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.Ivanti Sentry 9.x ALG Security Technical Implementation GuideV-251013CAT IIThe Sentry that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.Ivanti Sentry 9.x ALG Security Technical Implementation GuideV-213494CAT IIHTTP management session traffic must be encrypted.JBoss Enterprise Application Platform 6.3 Security Technical Implementation GuideV-217338CAT IIThe Juniper router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.Juniper Router NDM Security Technical Implementation GuideV-66021CAT IThe Juniper SRX Services Gateway VPN must use AES encryption for the IPsec proposal to protect the confidentiality of remote access sessions.Juniper SRX SG VPN Security Technical Implementation GuideV-66617CAT IThe Juniper SRX Services Gateway VPN must use AES encryption for the Internet Key Exchange (IKE) proposal to protect the confidentiality of remote access sessions.Juniper SRX SG VPN Security Technical Implementation GuideV-66647CAT IIThe Juniper SRX Services Gateway VPN must implement a FIPS-140-2 validated Diffie-Hellman (DH) group.Juniper SRX SG VPN Security Technical Implementation GuideV-214672CAT IThe Juniper SRX Services Gateway VPN must use AES256 for the IPsec proposal to protect the confidentiality of remote access sessions.Juniper SRX Services Gateway VPN Security Technical Implementation GuideV-214673CAT IThe Juniper SRX Services Gateway VPN must use AES256 encryption for the Internet Key Exchange (IKE) proposal to protect the confidentiality of remote access sessions.Juniper SRX Services Gateway VPN Security Technical Implementation GuideV-214674CAT IThe Juniper SRX Services Gateway VPN must be configured to use Diffie-Hellman (DH) group 15 or higher.Juniper SRX Services Gateway VPN Security Technical Implementation GuideV-242376CAT IIThe Kubernetes Controller Manager must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.Kubernetes Security Technical Implementation GuideV-242377CAT IIThe Kubernetes Scheduler must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.Kubernetes Security Technical Implementation GuideV-242378CAT IIThe Kubernetes API Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.Kubernetes Security Technical Implementation GuideV-242379CAT IIThe Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.Kubernetes Security Technical Implementation GuideV-242380CAT IIThe Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.Kubernetes Security Technical Implementation GuideV-228415CAT IIExchange must use encryption for RPC client access.Microsoft Exchange 2016 Mailbox Server Security Technical Implementation GuideV-228416CAT IIExchange must use encryption for Outlook Web App (OWA) access.Microsoft Exchange 2016 Mailbox Server Security Technical Implementation GuideV-228417CAT IIExchange must have forms-based authentication disabled.Microsoft Exchange 2016 Mailbox Server Security Technical Implementation GuideV-259577CAT IISchUseStrongCrypto must be enabled.Microsoft Exchange 2019 Edge Server Security Technical Implementation GuideV-259645CAT IIExchange must use encryption for RPC client access.Microsoft Exchange 2019 Mailbox Server Security Technical Implementation GuideV-259646CAT IIExchange must use encryption for Outlook Web App (OWA) access.Microsoft Exchange 2019 Mailbox Server Security Technical Implementation GuideV-259647CAT IIExchange must have forms-based authentication enabled.Microsoft Exchange 2019 Mailbox Server Security Technical Implementation GuideV-218737CAT IIA private IIS 10.0 website must only accept Secure Socket Layer (SSL) connections.Microsoft IIS 10.0 Site Security Technical Implementation GuideV-218738CAT IIA public IIS 10.0 website must only accept Secure Socket Layer (SSL) connections when authentication is required.Microsoft IIS 10.0 Site Security Technical Implementation GuideV-220852CAT IIRemote Desktop Services must be configured with the client connection encryption set to the required level.Microsoft Windows 10 Security Technical Implementation GuideV-253406CAT IIRemote Desktop Services must be configured with the client connection encryption set to the required level.Microsoft Windows 11 Security Technical Implementation GuideV-225059CAT IIWindows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows Server 2016 Security Technical Implementation GuideV-205636CAT IIWindows Server 2019 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.Microsoft Windows Server 2019 Security Technical Implementation GuideV-205637CAT IIWindows Server 2019 Remote Desktop Services must be configured with the client connection encryption set to High Level.Microsoft Windows Server 2019 Security Technical Implementation GuideV-254368CAT IIWindows Server 2022 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.Microsoft Windows Server 2022 Security Technical Implementation GuideV-254369CAT IIWindows Server 2022 Remote Desktop Services must be configured with the client connection encryption set to High Level.Microsoft Windows Server 2022 Security Technical Implementation GuideV-278115CAT IIWindows Server 2025 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.Microsoft Windows Server 2025 Security Technical Implementation GuideV-278116CAT IIWindows Server 2025 Remote Desktop Services must be configured with the client connection encryption set to High Level.Microsoft Windows Server 2025 Security Technical Implementation GuideV-254099CAT INutanix AOS must implement cryptography mechanisms to protect the confidentiality and integrity of the remote access session.Nutanix AOS 5.20.x Application Security Technical Implementation GuideV-254125CAT INutanix AOS must implement DoD-approved encryption to protect the confidentiality of remote access sessions.Nutanix AOS 5.20.x OS Security Technical Implementation GuideV-279418CAT IINutanix AOS must have TLS enabled.Nutanix Acropolis Application Server Security Technical Implementation GuideV-279533CAT INutanix OS must implement DOD-approved encryption to protect the confidentiality of SSH sessions.Nutanix Acropolis GPOS Security Technical Implementation GuideV-221277CAT IOHS must have the LoadModule ossl_module directive enabled to encrypt remote connections in accordance with the categorization of data hosted by the web server.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221278CAT IOHS must have the SSLFIPS directive enabled to encrypt remote connections in accordance with the categorization of data hosted by the web server.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221279CAT IIOHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to encrypt remote connections in accordance with the categorization of data hosted by the web server.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221280CAT IOHS must have the SSLCipherSuite directive enabled to encrypt remote connections in accordance with the categorization of data hosted by the web server.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221758CAT IThe Oracle Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Oracle Linux 7 Security Technical Implementation GuideV-221840CAT IIThe Oracle Linux 7 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.Oracle Linux 7 Security Technical Implementation GuideV-248524CAT IOL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Oracle Linux 8 Security Technical Implementation GuideV-248868CAT IIOL 8 must force a frequent session key renegotiation for SSH connections to the server.Oracle Linux 8 Security Technical Implementation GuideV-283446CAT IOL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Oracle Linux 8 Security Technical Implementation GuideV-283450CAT IOL 8 IP tunnels must use FIPS 140-3-approved cryptographic algorithms.Oracle Linux 8 Security Technical Implementation GuideV-271454CAT IOL 9 must enable FIPS mode.Oracle Linux 9 Security Technical Implementation GuideV-271705CAT IIOL 9 must force a frequent session key renegotiation for SSH connections to the server.Oracle Linux 9 Security Technical Implementation GuideV-271743CAT IOL 9 IP tunnels must use 140-3 approved cryptographic algorithms.Oracle Linux 9 Security Technical Implementation Guide