STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-13 — Cryptographic Protection

CCI-002450

Definition

Implement organization-defined types of cryptography for each specified cryptography use.

Parent Control

SC-13Cryptographic ProtectionSystem and Communications Protection

Linked STIG Checks (200)

V-245874CAT IIAdobe Acrobat Pro DC Continuous FIPS mode must be enabled.Adobe Acrobat Professional DC Continuous Track Security Technical Implementation GuideV-213193CAT IIAdobe Reader DC must enable FIPS mode.Adobe Acrobat Reader DC Continuous Track Security Technical Implementation GuideV-279063CAT IIColdFusion must be configured to use only DOD-approved keystores and truststores containing certificates issued by a DOD Public Key Infrastructure (PKI) Certificate Authority (CA), and all keystore and truststore files must be protected by file system permissions that prevent unauthorized access or modification.Adobe ColdFusion Security Technical Implementation GuideV-76427CAT IKona Site Defender providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-76429CAT IIKona Site Defender providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-76431CAT IKona Site Defender providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-274040CAT IAmazon Linux 2023 must have the crypto-policies package installed.Amazon Linux 2023 Security Technical Implementation GuideV-274057CAT IAmazon Linux 2023 must enable FIPS mode.Amazon Linux 2023 Security Technical Implementation GuideV-274058CAT IAmazon Linux 2023 crypto policy must not be overridden.Amazon Linux 2023 Security Technical Implementation GuideV-283452CAT IAmazon Linux 2023 must implement a FIPS 140-2/140-3 compliant systemwide cryptographic policy.Amazon Linux 2023 Security Technical Implementation GuideV-268168CAT INixOS must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Anduril NixOS Security Technical Implementation GuideV-214278CAT IIThe Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.Apache Server 2.4 UNIX Site Security Technical Implementation GuideV-223001CAT IIIApplication servers must use NIST-approved or NSA-approved key management technology and processes.Apache Tomcat Application Server 9 Security Technical Implementation GuideV-252519CAT IThe macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.Apple macOS 12 (Monterey) Security Technical Implementation GuideV-257225CAT IThe macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.Apple macOS 13 (Ventura) Security Technical Implementation GuideV-268438CAT IThe macOS system must limit SSHD to FIPS-compliant connections.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268439CAT IThe macOS system must limit SSH to FIPS-compliant connections.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277046CAT IThe macOS system must limit SSHD to FIPS-compliant connections.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277047CAT IThe macOS system must limit SSH to FIPS-compliant connections.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-205042CAT IIThe ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.Application Layer Gateway Security Requirements GuideV-205043CAT IIThe ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.Application Layer Gateway Security Requirements GuideV-205044CAT IIThe ALG providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.Application Layer Gateway Security Requirements GuideV-278955CAT IIThe ALG must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.Application Layer Gateway Security Requirements GuideV-278956CAT IIThe ALG must be configured to use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.Application Layer Gateway Security Requirements GuideV-278957CAT IIThe ALG must use a FIPS-validated cryptographic module to provision digital signatures.Application Layer Gateway Security Requirements GuideV-278958CAT IIThe ALG must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.Application Layer Gateway Security Requirements GuideV-274783CAT IIThe API must use a FIPS-validated cryptographic module to provision digital signatures for tokens.Application Programming Interface (API) Security Requirements GuideV-222570CAT IIThe application must utilize FIPS-validated cryptographic modules when signing application components.Application Security and Development Security Technical Implementation GuideV-222571CAT IIThe application must utilize FIPS-validated cryptographic modules when generating cryptographic hashes.Application Security and Development Security Technical Implementation GuideV-222572CAT IIThe application must utilize FIPS-validated cryptographic modules when protecting unclassified information that requires cryptographic protection.Application Security and Development Security Technical Implementation GuideV-222573CAT IIApplications making SAML assertions must use FIPS-approved random numbers in the generation of SessionIndex in the SAML element AuthnStatement.Application Security and Development Security Technical Implementation GuideV-265634CAT IIThe application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Application Security and Development Security Technical Implementation GuideV-204831CAT IIApplication servers must use NIST-approved or NSA-approved key management technology and processes.Application Server Security Requirements GuideV-204832CAT IIThe application server must use DOD- or CNSS-approved PKI Class 3 or Class 4 certificates.Application Server Security Requirements GuideV-240925CAT IIThe application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Application Server Security Requirements GuideV-237338CAT IThe ArcGIS Server SSL settings must use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.ArcGIS for Server 10.3 Security Technical Implementation GuideV-272436CAT IIA BIND 9.x server must implement NIST FIPS-validated cryptography for provisioning digital signatures and generating cryptographic hashes.BIND 9.x Security Technical Implementation GuideV-237414CAT IIThe CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.CA API Gateway ALG Security Technical Implementation GuideV-237415CAT IIThe CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.CA API Gateway ALG Security Technical Implementation GuideV-237416CAT IIThe CA API Gateway providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.CA API Gateway ALG Security Technical Implementation GuideV-251656CAT IICA IDMS must implement NIST FIPS 140-2 validated cryptographic modules to protect data-in-transit.CA IDMS Security Technical Implementation GuideV-219151CAT IThe Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Canonical Ubuntu 18.04 LTS Security Technical Implementation GuideV-238363CAT IThe Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Canonical Ubuntu 20.04 LTS Security Technical Implementation GuideV-260650CAT IUbuntu 22.04 LTS must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Canonical Ubuntu 22.04 LTS Security Technical Implementation GuideV-270744CAT IUbuntu 24.04 LTS must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Canonical Ubuntu 24.04 LTS Security Technical Implementation GuideV-206510CAT IThe Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.Central Log Server Security Requirements GuideV-239953CAT IIThe Cisco ASA must be configured to use NIST FIPS-validated cryptography for Internet Key Exchange (IKE) Phase 1.Cisco ASA VPN Security Technical Implementation GuideV-239955CAT IIThe Cisco ASA must be configured to use a FIPS-validated cryptographic module to generate cryptographic hashes.Cisco ASA VPN Security Technical Implementation GuideV-239956CAT IIThe Cisco ASA must be configured to use a FIPS-validated cryptographic module to implement IPsec encryption services.Cisco ASA VPN Security Technical Implementation GuideV-239962CAT IThe Cisco ASA VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.Cisco ASA VPN Security Technical Implementation GuideV-239985CAT IThe Cisco ASA VPN remote access server must be configured to use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network.Cisco ASA VPN Security Technical Implementation GuideV-234565CAT ICitrix Delivery Controller must implement DoD-approved encryption.Citrix Virtual Apps and Desktop 7.x Delivery Controller Security Technical Implementation GuideV-213197CAT IDelivery Controller must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Citrix XenDesktop 7.x Delivery Controller Security Technical Implementation GuideV-213208CAT ICitrix Receiver must implement DoD-approved encryption.Citrix XenDesktop 7.x Receiver Security Technical Implementation GuideV-269125CAT IAlmaLinux OS 9 must use the TuxCare ESU repository.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269126CAT IAlmaLinux OS 9 must use the TuxCare FIPS packages and not the default encryption packages.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-269127CAT IAlmaLinux OS 9 must enable FIPS mode.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-283453CAT IAlmaLinux 9 cryptographic policy must not be overridden.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-283454CAT IAlmaLinux OS 9 must have the crypto-policies package installed.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-283455CAT IAlmaLinux OS 9 must implement a FIPS 140-3-compliant systemwide cryptographic policy.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-233211CAT IIThe container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Container Platform Security Requirements GuideV-233271CAT IIThe container platform must use a valid FIPS 140-2 or FIPS 140-3 approved cryptographic module to generate hashes.Container Platform Security Requirements GuideV-233289CAT IThe container platform must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.Container Platform Security Requirements GuideV-233583CAT IPostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.Crunchy Data PostgreSQL Security Technical Implementation GuideV-233584CAT IPostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owner’s requirements.Crunchy Data PostgreSQL Security Technical Implementation GuideV-233585CAT IPostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner’s requirements.Crunchy Data PostgreSQL Security Technical Implementation GuideV-261928CAT IPostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.Crunchy Data Postgres 16 Security Technical Implementation GuideV-261965CAT IIPostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.Crunchy Data Postgres 16 Security Technical Implementation GuideV-261966CAT IIPostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners' requirements.Crunchy Data Postgres 16 Security Technical Implementation GuideV-206639CAT IIThe DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.Database Security Requirements GuideV-206640CAT IIThe DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.Database Security Requirements GuideV-206641CAT IIThe DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.Database Security Requirements GuideV-233495CAT IThe DBMS must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.Database Security Requirements GuideV-235777CAT IFIPS mode must be enabled on all Docker Engine - Enterprise nodes.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-235872CAT IIDocker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-205226CAT IIThe DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.Domain Name System (DNS) Security Requirements GuideV-224174CAT IThe EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-224239CAT IIThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.EDB Postgres Advanced Server v11 on Windows Security Technical Implementation GuideV-213664CAT IThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-213665CAT IThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-213666CAT IThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.EDB Postgres Advanced Server v9.6 Security Technical Implementation GuideV-259971CAT IIThe Enterprise Voice, Video, and Messaging Endpoint must be configured to use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.Enterprise Voice, Video, and Messaging Endpoint Security Requirements GuideV-260039CAT IThe Enterprise Voice, Video, and Messaging Session Manager must implement NIST FIPS-validated cryptography for communications sessions.Enterprise Voice, Video, and Messaging Session Management Security Requirements GuideV-259288CAT IIThe DBMS must use NSA-approved cryptography to protect classified information in accordance with the requirements of the data owner.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-259325CAT IIThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-259326CAT IIThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-259327CAT IIThe EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation GuideV-215798CAT IIThe BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography to generate cryptographic hashes when providing encryption traffic to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215799CAT IIThe BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography for digital signatures when providing encrypted traffic to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215800CAT IIThe BIG-IP Core implementation must be configured to use NIST FIPS-validated cryptography to implement encryption services when providing encrypted traffic to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-266170CAT IThe F5 BIG-IP appliance must be configured to use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-266286CAT IThe F5 BIG-IP appliance IPsec VPN must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.F5 BIG-IP TMOS VPN Security Technical Implementation GuideV-278405CAT IINGINX must be configured to use FIPS-approved algorithms to protect the confidentiality and integrity of transmitted information.F5 NGINX Security Technical Implementation GuideV-278407CAT IINGINX must be configured to use a FIPS-validated cryptographic module for confidentiality and integrity.F5 NGINX Security Technical Implementation GuideV-203739CAT IThe operating system must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.General Purpose Operating System Security Requirements GuideV-203776CAT IThe operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.General Purpose Operating System Security Requirements GuideV-278975CAT IIThe operating system must use a FIPS-validated cryptographic module to provision digital signatures.General Purpose Operating System Security Requirements GuideV-255239CAT IISSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.HPE 3PAR SSMC Operating System Security Technical Implementation GuideV-255251CAT IThe SSMC web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.HPE 3PAR SSMC Web Server Security Technical Implementation GuideV-255285CAT IIThe HPE 3PAR OS must be configured to implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.HPE 3PAR StoreServ 3.3.x Security Technical Implementation GuideV-266986CAT IIAOS, when used as a VPN Gateway, must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.HPE Aruba Networking AOS VPN Security Technical Implementation GuideV-266639CAT IIAOS must use cryptographic algorithms approved by the National Security Agency (NSA) to protect national security systems (NSS) when transporting classified traffic across an unclassified network.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-274315CAT IAll mobile Honeywell cryptography must be configured to be in FIPS 140-3 validated mode.Honeywell Android 13 COBO Security Technical Implementation GuideV-274411CAT IAll mobile Honeywell cryptography must be configured to be in FIPS 140-3 validated mode.Honeywell Android 13 COPE Security Technical Implementation GuideV-215216CAT IIAIX must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.IBM AIX 7.x Security Technical Implementation GuideV-252570CAT IThe IBM Aspera Console must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252590CAT IIBM Aspera Faspex must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252607CAT IIBM Aspera Shares feature must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252616CAT IThe IBM Aspera High-Speed Transfer Endpoint must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252619CAT IIThe IBM Aspera High-Speed Transfer Endpoint must have a master-key set to encrypt the dynamic token encryption key.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252630CAT IThe IBM Aspera High-Speed Transfer Server must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252635CAT IIThe IBM Aspera High-Speed Transfer Server must have a master-key set to encrypt the dynamic token encryption key.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-253507CAT IDB2 must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.IBM DB2 V10.5 LUW Security Technical Implementation GuideV-65309CAT IIThe DataPower Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.IBM DataPower ALG Security Technical Implementation GuideV-65311CAT IIThe DataPower Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.IBM DataPower ALG Security Technical Implementation GuideV-65313CAT IIThe DataPower Gateway providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.IBM DataPower ALG Security Technical Implementation GuideV-255780CAT IIThe MQ Appliance messaging server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-255793CAT IIThe MQ Appliance messaging server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-255808CAT IIMQ Appliance messaging servers must use NIST-approved or NSA-approved key management technology and processes.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-250338CAT IIThe WebSphere Liberty Server must use DoD-issued/signed certificates.IBM WebSphere Liberty Server Security Technical Implementation GuideV-250339CAT IThe WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.IBM WebSphere Liberty Server Security Technical Implementation GuideV-283668CAT IThe WebSphere Liberty Server must use FIPS 140-3-approved encryption modules when authenticating users and processes.IBM WebSphere Liberty Server Security Technical Implementation GuideV-255875CAT IIThe WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-255877CAT IIThe WebSphere Application Server must use DoD-approved Signer Certificates.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-283677CAT IIThe WebSphere Application Server must use FIPS 140-3-approved encryption modules when authenticating users and processes.IBM WebSphere Traditional V9.x Security Technical Implementation GuideV-223569CAT IThe IBM z/OS systems requiring data at rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.IBM z/OS ACF2 Security Technical Implementation GuideV-223610CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS ACF2 Security Technical Implementation GuideV-223831CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS RACF Security Technical Implementation GuideV-224067CAT IIIBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.IBM z/OS TSS Security Technical Implementation GuideV-237945CAT IIThe IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED.IBM zVM Using CA VM:Secure Security Technical Implementation GuideV-237947CAT IIAll IBM z/VM TCP/IP servers must be configured for SSL/TLS connection.IBM zVM Using CA VM:Secure Security Technical Implementation GuideV-224778CAT IIThe ISEC7 SPHERE must use a FIPS-validated cryptographic module to provision digital signatures.ISEC7 Sphere Security Technical Implementation GuideV-224779CAT IIThe ISEC7 SPHERE must use a FIPS 140-2-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality, generate cryptographic hashes, and to configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.ISEC7 Sphere Security Technical Implementation GuideV-214201CAT IThe DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.Infoblox 7.x DNS Security Technical Implementation GuideV-233906CAT IThe Infoblox DNS service member must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.Infoblox 8.x DNS Security Technical Implementation GuideV-258595CAT IIThe ICS must be configured to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.Ivanti Connect Secure VPN Security Technical Implementation GuideV-251420CAT IThe Ivanti EPMM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.Ivanti EPMM Server Security Technical Implementation GuideV-251423CAT IThe Ivanti EPMM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.Ivanti EPMM Server Security Technical Implementation GuideV-251420CAT IThe Ivanti MobileIron Core server must use a FIPS-validated cryptographic module to generate cryptographic hashes.Ivanti MobileIron Core MDM Server Security Technical Implementation GuideV-251423CAT IThe Ivanti MobileIron Core server must be configured to implement FIPS 140-2 mode for all server and agent encryption.Ivanti MobileIron Core MDM Server Security Technical Implementation GuideV-251036CAT IIThe Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation GuideV-251037CAT IIThe Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation GuideV-251038CAT IIThe Sentry providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation GuideV-251036CAT IIThe Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.Ivanti Sentry 9.x ALG Security Technical Implementation GuideV-251037CAT IIThe Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.Ivanti Sentry 9.x ALG Security Technical Implementation GuideV-251038CAT IIThe Sentry providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.Ivanti Sentry 9.x ALG Security Technical Implementation GuideV-213558CAT IIThe JBoss server must be configured to use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.JBoss Enterprise Application Platform 6.3 Security Technical Implementation GuideV-241790CAT IIWhen the Jamf Pro EMM server cannot establish a connection to determine the validity of a certificate, the server must not have the option to accept the certificate.Jamf Pro v10.x EMM Security Technical Implementation GuideV-66625CAT IThe Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.Juniper SRX SG VPN Security Technical Implementation GuideV-66671CAT IIThe Juniper SRX Services Gateway VPN IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.Juniper SRX SG VPN Security Technical Implementation GuideV-214690CAT IThe Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must be configured to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.Juniper SRX Services Gateway VPN Security Technical Implementation GuideV-214691CAT IIThe Juniper SRX Services Gateway VPN IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.Juniper SRX Services Gateway VPN Security Technical Implementation GuideV-213862CAT ISQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.MS SQL Server 2014 Instance Security Technical Implementation GuideV-251040CAT ISQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.MS SQL Server 2016 Database Security Technical Implementation GuideV-205619CAT IIThe Mainframe Product must implement NIST FIPS-validated cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.Mainframe Product Security Requirements GuideV-205620CAT IIThe Mainframe Product must implement NIST FIPS-validated cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.Mainframe Product Security Requirements GuideV-205621CAT IIThe Mainframe Product must implement NIST FIPS-validated cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.Mainframe Product Security Requirements GuideV-253508CAT IIThe Mainframe Product must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.Mainframe Product Security Requirements GuideV-253737CAT IMariaDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.MariaDB Enterprise 10.x Security Technical Implementation GuideV-220368CAT IMarkLogic Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations and protect classified information in accordance with the requirements of the data owner.MarkLogic Server v9 Security Technical Implementation GuideV-220414CAT IIMarkLogic Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.MarkLogic Server v9 Security Technical Implementation GuideV-220415CAT IIMarkLogic Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.MarkLogic Server v9 Security Technical Implementation GuideV-220416CAT IIMarkLogic Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.MarkLogic Server v9 Security Technical Implementation GuideV-255320CAT IAzure SQL Database must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.Microsoft Azure SQL Database Security Technical Implementation GuideV-276236CAT IAzure SQL Managed Instance must use NSA-approved cryptography to protect classified information in accordance with the data owners' requirements.Microsoft Azure SQL Managed Instance Security Technical Implementation GuideV-225230CAT IIThe .NET CLR must be configured to use FIPS approved encryption modules.Microsoft DotNet Framework 4.0 Security Technical Implementation GuideV-250540CAT IITurn off Encryption Support must be enabled.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-250541CAT IIAllow Fallback to SSL 3.0 (Internet Explorer) must be disabled.Microsoft Internet Explorer 11 Security Technical Implementation GuideV-223356CAT IIThe minimum encryption key length in Outlook must be at least 168.Microsoft Office 365 ProPlus Security Technical Implementation GuideV-228474CAT IIOutlook minimum encryption key length settings must be set.Microsoft Outlook 2016 Security Technical Implementation GuideV-271199CAT ISQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owner’s requirements.Microsoft SQL Server 2022 Database Security Technical Implementation GuideV-271314CAT ISQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic operations for encryption, hashing, and signing.Microsoft SQL Server 2022 Instance Security Technical Implementation GuideV-220942CAT IIThe system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows 10 Security Technical Implementation GuideV-253466CAT IIThe system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows 11 Security Technical Implementation GuideV-215609CAT IIThe salt value for zones signed using NSEC3 RRs must be changed every time the zone is completely re-signed.Microsoft Windows 2012 Server Domain Name System Security Technical Implementation GuideV-215637CAT IIThe Windows 2012 DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.Microsoft Windows 2012 Server Domain Name System Security Technical Implementation GuideV-224977CAT IISeparate, NSA-approved (Type 1) cryptography must be used to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.Microsoft Windows Server 2016 Security Technical Implementation GuideV-225059CAT IIWindows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows Server 2016 Security Technical Implementation GuideV-205818CAT IIWindows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.Microsoft Windows Server 2019 Security Technical Implementation GuideV-205842CAT IIWindows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows Server 2019 Security Technical Implementation GuideV-254398CAT IIWindows Server 2022 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.Microsoft Windows Server 2022 Security Technical Implementation GuideV-254480CAT IIWindows Server 2022 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows Server 2022 Security Technical Implementation GuideV-278145CAT IIWindows Server 2025 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.Microsoft Windows Server 2025 Security Technical Implementation GuideV-278230CAT IIWindows Server 2025 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.Microsoft Windows Server 2025 Security Technical Implementation GuideV-259400CAT IIThe Windows DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation GuideV-260908CAT IFIPS mode must be enabled.Mirantis Kubernetes Engine Security Technical Implementation GuideV-260911CAT IISwarm Secrets or Kubernetes Secrets must be used.Mirantis Kubernetes Engine Security Technical Implementation GuideV-221174CAT IMongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.MongoDB Enterprise Advanced 3.x Security Technical Implementation GuideV-252146CAT IMongoDB must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.MongoDB Enterprise Advanced 4.x Security Technical Implementation GuideV-265922CAT IMongoDB must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-265945CAT IMongoDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.MongoDB Enterprise Advanced 7.x Security Technical Implementation GuideV-279353CAT IMongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-279385CAT IMongoDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.MongoDB Enterprise Advanced 8.x Security Technical Implementation GuideV-254114CAT INutanix AOS must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.Nutanix AOS 5.20.x Application Security Technical Implementation GuideV-254224CAT INutanix AOS must enable FIPS mode to implement NIST FIPS-validated cryptography.Nutanix AOS 5.20.x OS Security Technical Implementation GuideV-279445CAT IINutanix AOS must be configured to use DOD PKI-issued certificates.Nutanix Acropolis Application Server Security Technical Implementation GuideV-279535CAT INutanix OS must implement cryptography to protect the integrity of remote access session by setting the systemwide policy to use FIPS mode.Nutanix Acropolis GPOS Security Technical Implementation GuideV-270571CAT IOracle Database must implement NIST FIPS 140-2/140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.Oracle Database 19c Security Technical Implementation GuideV-252546CAT IOHS must have the SSLFIPS directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.Oracle HTTP Server 12.1.3 Security Technical Implementation GuideV-221758CAT IThe Oracle Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Oracle Linux 7 Security Technical Implementation Guide