The operating system must protect the confidentiality of transmitted information.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| medium | V-219979 | SRG-OS-000423 | SOL-11.1-060100 | SV-219979r958908_rule | 2025-05-05 | 3 |
| Description |
|---|
| Ensuring the confidentiality of transmitted information requires the operating system take feasible measures to employ transmission layer security. This requirement applies to communications across internal and external networks. |
| ℹ️ Check |
|---|
| All remote sessions must be conducted via encrypted services and ports. Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding. |
| ✔️ Fix |
|---|
| All remote sessions must be conducted via SSH and IPsec. Ensure that SSH and IPsec are the only protocols used. |