The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

From Windows Server 2008 R2 Member Server Security Technical Implementation Guide

Part of FIPS Compliant Algorithms

Associated with IA controls: ECCT-1, ECCT-2

SV-32342r1_rule The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

Vulnerability discussion

This setting ensures that the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government and should be the algorithms used for all OS encryption functions.

Check content

Fix text

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” to “Enabled”.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer