STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Web Server Security Technical Implementation Guide

V-255253

CAT I (High)

SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.

Rule ID

SV-255253r960759_rule

STIG

HPE 3PAR SSMC Web Server Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000068CCI-000197CCI-002418CCI-002420CCI-002422

Discussion

The SSMC web server has several remote communications channels. Examples are user requests via http/https, communication to a backend database, or communication to authenticate users. The encryption used to communicate must match the data that is being retrieved or presented. Methods of communication are http for publicly displayed information, https to encrypt when user data is being transmitted, VPN tunneling, or other encryption methods to a database. Satisfies: SRG-APP-000014-WSR-000006, SRG-APP-000172-WSR-000104, SRG-APP-000439-WSR-000151, SRG-APP-000439-WSR-000156, SRG-APP-000441-WSR-000181, SRG-APP-000442-WSR-000182

Check Content

Verify that SSMC uses encryption strength equal to the categorization of data hosted by doing the following:

1. Log on to SSH as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following:

$ grep ^ssmc.secure.tls.only /opt/hpe/ssmc/ssmcbase/resources/ssmc.properties
ssmc.secure.tls.only = true

If the command output does not read "ssmc.secure.tls.only = true", this is a finding.

Fix Text

Configure SSMC to use encryption strength equal to the categorization of data hosted by doing the following: 

1. Log on to SSH as ssmcadmin. Press "X" to escape to general bash shell.

2. Using vi edit ssmc.properties and set "ssmc.secure.tls.only=true". Save and exit.

3. Type "config_appliance" to return to TUI. Restart (stop and start) SSMC services using TUI menu option 2.