Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, routers need to leverage transmission protection mechanisms, such as TLS, TLS VPNs, or IPSEC. This requirement also applies to Zero Trust initiatives.
Verify the router is configured to implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. If the router does not implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission, this is a finding.
Configure the router to implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.