The application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

From Application Security and Development Security Technical Implementation Guide

Part of SRG-APP-000416

Associated with: CCI-002450

SV-84811r2_rule The application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

Vulnerability discussion

Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect classified data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. Advanced Encryption Standard (AES)Symmetric block cipher used for information protectionFIPS Pub 197Use 256 bit keys to protect up to TOP SECRETElliptic Curve Diffie-Hellman (ECDH) Key ExchangeAsymmetric algorithm used for key establishmentNIST SP 800-56AUse Curve P-384 to protect up to TOP SECRET.Elliptic Curve Digital Signature Algorithm (ECDSA)Asymmetric algorithm used for digital signaturesFIPS Pub 186-4Use Curve P-384 to protect up to TOP SECRET.Secure Hash Algorithm (SHA)Algorithm used for computing a condensed representation of informationFIPS Pub 180-4Use SHA-384 to protect up to TOP SECRET. Diffie-Hellman (DH) Key ExchangeAsymmetric algorithm used for key establishmentIETF RFC 3526 Minimum 3072-bit modulus to protect up to TOP SECRETRSAAsymmetric algorithm used for key establishmentNIST SP 800-56B rev 1Minimum 3072-bit modulus to protect up to TOP SECRETRSA Asymmetric algorithm used for digital signaturesFIPS PUB 186-4Minimum 3072 bit-modulus to protect up to TOP SECRET.

Check content

Review the application documentation, system security plan and interview the application administrator to determine if the application processes classified data. If the application does not process classified data, this requirement is not applicable. Identify the data classifications and the cryptographic protections established to protect the application data. Verify the application is configured to utilize the appropriate encryption based upon data classification, cryptographic tasks that need to be performed (information protection, hashing, signing) and information protection requirements. NIST-certified cryptography must be used to store classified non-Sources and Methods Intelligence (SAMI) information if required by the information owner. NSA-validated type-1 encryption must be used for all SAMI data stored in the enclave. If the application is not configured to utilize the NSA-approved cryptographic modules in accordance with data protection requirements specified in the security plan, this is a finding.

Fix text

Configure application to encrypt stored classified information; Ensure encryption is performed using NIST FIPS 140-2-validated encryption. Encrypt stored, non-SAMI classified information using NIST FIPS 140-2-validated encryption. Implement NSA-validated type-1 encryption of all SAMI data stored in the enclave.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer