STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-28 (3)
System and Communications Protection
Rev 5
Protection of Information at Rest
CCI Identifiers (2)
CCI-004910
Provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
CCI-004911
Defines the safeguards for providing protected storage for cryptographic keys.
Linked STIG Checks (32)
Across 31 STIGs. Click to expand.
▶
Anduril NixOS Security Technical Implementation Guide
1 check
▶
Apache Tomcat Application Server 9 Security Technical Implementation Guide
1 check
▶
Application Layer Gateway Security Requirements Guide
1 check
▶
Application Programming Interface (API) Security Requirements Guide
1 check
▶
Application Server Security Requirements Guide
1 check
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
1 check
▶
Central Log Server Security Requirements Guide
1 check
▶
Cisco IOS Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS Switch NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router NDM Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Switch NDM Security Technical Implementation Guide
1 check
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
1 check
▶
Container Platform Security Requirements Guide
1 check
▶
Database Security Requirements Guide
1 check
▶
Domain Name System (DNS) Security Requirements Guide
2 checks
▶
General Purpose Operating System Security Requirements Guide
1 check
▶
IBM z/OS ACF2 Security Technical Implementation Guide
1 check
▶
IBM z/OS RACF Security Technical Implementation Guide
1 check
▶
IBM z/OS TSS Security Technical Implementation Guide
1 check
▶
Mainframe Product Security Requirements Guide
1 check
▶
Microsoft Windows Server 2025 Security Technical Implementation Guide
1 check
▶
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
1 check
▶
Nutanix Acropolis GPOS Security Technical Implementation Guide
1 check
▶
Oracle Linux 9 Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
1 check
▶
Riverbed NetIM OS Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 7.x for Windows Security Technical Implementation Guide
1 check
▶
Splunk Enterprise 8.x for Linux Security Technical Implementation Guide
1 check
▶
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
1 check
▶
Virtual Machine Manager Security Requirements Guide
1 check
▶
Web Server Security Requirements Guide
1 check