The application must utilize FIPS-validated cryptographic modules when signing application components.

From Application Security and Development Security Technical Implementation Guide

Part of SRG-APP-000514

Associated with: CCI-002450

SV-84813r2_rule The application must utilize FIPS-validated cryptographic modules when signing application components.

Vulnerability discussion

Applications that distribute components of the application must sign the components to provide an identity assurance to consumers of the application component. Components can include application messages or application code.Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to validate the author of application components. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance the modules have been tested and validated.If the application resides on a National Security System (NSS) it must not use algorithms weaker than SHA-384.

Check content

Review the application documentation and interview the application administrator to identify the cryptographic modules used by the application. Review the application components and application requirements. Interview application developers and application admins to determine if code signing is performed on distributable application components, files or packages. For example, a developer may sign application code components or an admin may sign application files or packages in order to provide application consumers with integrity assurances. If signing has been identified in the application security plan as not being required and if a documented acceptance of risk is provided, this is not a finding. Have the application admin or the developer demonstrate how the signing algorithms are used and how signing of components including files, code and packages is performed. While SHA1 is currently FIPS-140-2 approved, due to known vulnerabilities with this algorithm, DoD PKI policy prohibits the use of SHA1 as of December 2016. See DoD CIO Memo Subject: Revised Schedule to Update DoD Public Key Infrastructure Certificates to Secure Hash Algorithm-256. If the application signing process does not use FIPS validated cryptographic modules, or if the signing process includes SHA1 or MD5 hashing algorithms, this is a finding.

Fix text

Utilize FIPS-validated algorithms when signing application components.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer