FIPS 140-2/140-3 mode must be enabled on SLEM 5.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
high | V-261473 | SRG-OS-000396-GPOS-00176 | SLEM-05-671010 | SV-261473r996824_rule | 2024-06-04 | 1 |
Description |
---|
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. SLEM 5 must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. |
ℹ️ Check |
---|
Verify SLEM 5 is running in FIPS mode by running the following command. > cat /proc/sys/crypto/fips_enabled 1 If the value returned is "0", nothing is returned, or the file does not exist, this is a finding. |
✔️ Fix |
---|
To configure SLEM 5 to run in FIPS mode, add "fips=1" to the kernel parameter during SLEM 5 install. Enabling FIPS mode on a preexisting system involves a number of modifications to SLEM 5. Refer to section 9.1, "Crypto Officer Guidance", of the following document for installation guidance: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf |