FIPS 140-2/140-3 mode must be enabled on SLEM 5.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| high | V-261473 | SRG-OS-000396-GPOS-00176 | SLEM-05-671010 | SV-261473r996824_rule | 2025-05-08 | 1 |
| Description |
|---|
| Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. SLEM 5 must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. |
| ℹ️ Check |
|---|
| Verify SLEM 5 is running in FIPS mode by running the following command. > cat /proc/sys/crypto/fips_enabled 1 If the value returned is "0", nothing is returned, or the file does not exist, this is a finding. |
| ✔️ Fix |
|---|
| To configure SLEM 5 to run in FIPS mode, add "fips=1" to the kernel parameter during SLEM 5 install. Enabling FIPS mode on a preexisting system involves a number of modifications to SLEM 5. Refer to section 9.1, "Crypto Officer Guidance", of the following document for installation guidance: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf |