APPL-12-000054

This commit is contained in:
Dan Brodjieski
2022-02-09 12:43:06 -05:00
parent 66efe55194
commit 6824abe738

View File

@@ -0,0 +1,58 @@
id: os_sshd_fips_140_ciphers
title: "Limit SSHD to FIPS 140 Validated Ciphers"
discussion: |
If SSHD is enabled then it _MUST_ be configured to limit the ciphers to algorithms that are FIPS 140 validated.
FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meet federal requirements.
Operating systems utilizing encryption _MUST_ use FIPS validated mechanisms for authenticating to cryptographic modules.
NOTE: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system.
check: |
/usr/bin/grep -c "^Ciphers aes256-ctr,aes192-ctr,aes128-ctr" /etc/ssh/sshd_config
result:
integer: 1
fix: |
[source,bash]
----
/usr/bin/grep -q '^Ciphers' /etc/ssh/sshd_config && /usr/bin/sed -i.bak 's/.^Ciphers.*/Ciphers aes256-ctr,aes192-ctr,aes128-ctr/' /etc/ssh/sshd_config || /bin/echo 'Ciphers aes256-ctr,aes192-ctr,aes128-ctr' >> /etc/ssh/sshd_config; /bin/launchctl kickstart -k system/com.openssh.sshd
----
references:
cce:
- N/A
cci:
- CCI-000803
- CCI-000068
- CCI-003123
- CCI-002890
800-53r5:
- AC-17(2)
- IA-7
- SC-13
- SC-8(1)
800-53r4:
- AC-17(2)
- IA-7
- SC-8(1)
- SC-13
- MA-4(6)
srg:
- SRG-OS-000033-GPOS-00014
- SRG-OS-000120-GPOS-00061
- SRG-OS-000125-GPOS-00065
- SRG-OS-000250-GPOS-00093
- SRG-OS-000393-GPOS-00173
- SRG-OS-000394-GPOS-00174
disa_stig:
- APPL-12-000054
800-171r2:
- 3.1.13
- 3.13.8
- 3.13.11
macOS:
- "12.0"
tags:
- stig
severity: "medium"
mobileconfig: false
mobileconfig_info: