The operating system must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.

From General Purpose Operating System SRG

Part of SRG-OS-000404-GPOS-00183

Associated with: CCI-002475

SV-71001r1_rule The operating system must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.

Vulnerability discussion

Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.Selection of a cryptographic mechanism is based on the need to protect the integrity of organizational information. The strength of the mechanism is commensurate with the security category and/or classification of the information. Organizations have the flexibility to either encrypt all information on storage devices (i.e., full disk encryption) or encrypt specific data structures (e.g., files, records, or fields).

Check content

Verify the operating system implements cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components. If it does not, this is a finding.

Fix text

Configure the operating system to implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer