Rule ID
SV-254729r879616_rule
Version
V1R2
CCIs
CCI-000803
Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and DOD data may be compromised due to weak algorithms. In addition, the application must be configured to use the FIPS version of all cryptographic algorithms and modules.
Verify FIPS Mode is enabled for BEMS. 1. Under BEMS Systems Settings select "BEMS Configuration". 2. Select "FIPS Mode". 3. Confirm "Enable FIPS Mode for Cluster" has been selected. If "Enable FIPS Mode for Cluster" is not selected, this is a finding.
Enable FIPS Mode for BEMS. 1. In the BEMS Dashboard, under "BEMS Configuration", click "FIPS Mode". 2. Check the box "Enable FIPS Mode for Cluster". 3. Click "Save".