STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Router Security Requirements Guide

V-279006

CAT II (Medium)

The router must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.

Rule ID

SV-279006r1137968_rule

STIG

Router Security Requirements Guide

Version

V5R2

CCIs

CCI-002421

Discussion

Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, routers need to leverage transmission protection mechanisms, such as TLS, TLS VPNs, or IPSEC. This requirement also applies to Zero Trust initiatives.

Check Content

Verify the router is configured to implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.

If the router does not implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission, this is a finding.

Fix Text

Configure the router to implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.