From Application Security and Development Security Technical Implementation Guide
Part of SRG-APP-000428
Associated with: CCI-002475
Applications handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Review the documentation and interview the application administrator. Identify the data processed by the application and the accompanying data protection requirements. Determine if the data owner has specified data protection encryption requirements regarding modification of data. Determine if the application is processing publicly releasable, FOUO or classified data. Determine if the application configuration information contains sensitive information. If the data is strictly publicly releasable information and system documentation specifies no data encryption is required for any hosted application data, this is not applicable. Access the data repository and have the application administrator identify the encryption protections that are utilized. If the application processes classified data or if the data owner has specified encryption requirements and the application administrator is unable to demonstrate how the data is encrypted, this is a finding.
Identify data elements that require protection. Document the data types and specify encryption requirements. Encrypt data according to DoD policy or data owner requirements.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer