Configure Encryption settings in accordance with organizational standards.
CONTROL ID 07625
CONTROL TYPE Configuration
CLASSIFICATION Preventive
SUPPORTING AND SUPPORTED CONTROLS
This Control directly supports the implied Control(s):
Establish, implement, and maintain system hardening procedures., CC ID: 12001
This Control has the following implementation support Control(s):
Configure "Elastic Block Store volume encryption" to organizational standards., CC ID: 15434
Configure "Encryption Oracle Remediation" to organizational standards., CC ID: 15366
Configure the "encryption provider" to organizational standards., CC ID: 14591
Configure the "Microsoft network server: Digitally sign communications (always)" to organizational standards., CC ID: 07626
Configure the "Domain member: Digitally encrypt or sign secure channel data (always)" to organizational standards., CC ID: 07657
Configure the "Domain member: Digitally sign secure channel data (when possible)" to organizational standards., CC ID: 07678
Configure the "Network Security: Configure encryption types allowed for Kerberos" to organizational standards., CC ID: 07799
Configure the "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" to organizational standards., CC ID: 07822
Configure the "Configure use of smart cards on fixed data drives" to organizational standards., CC ID: 08361
Configure the "Enforce drive encryption type on removable data drives" to organizational standards., CC ID: 08363
Configure the "Configure TPM platform validation profile for BIOS-based firmware configurations" to organizational standards., CC ID: 08370
Configure the "Configure use of passwords for removable data drives" to organizational standards., CC ID: 08394
Configure the "Configure use of hardware-based encryption for removable data drives" to organizational standards., CC ID: 08401
Configure the "Require additional authentication at startup" to organizational standards., CC ID: 08422
Configure the "Deny write access to fixed drives not protected by BitLocker" to organizational standards., CC ID: 08429
Configure the "Configure startup mode" to organizational standards., CC ID: 08430
Configure the "Require client MAPI encryption" to organizational standards., CC ID: 08446
Configure the "Configure dial plan security" to organizational standards., CC ID: 08453
Configure the "Allow access to BitLocker-protected removable data drives from earlier versions of Windows" to organizational standards., CC ID: 08457
Configure the "Enforce drive encryption type on fixed data drives" to organizational standards., CC ID: 08460
Configure the "Allow Secure Boot for integrity validation" to organizational standards., CC ID: 08461
Configure the "Configure use of passwords for operating system drives" to organizational standards., CC ID: 08478
Configure the "Choose how BitLocker-protected removable drives can be recovered" to organizational standards., CC ID: 08484
Configure the "Validate smart card certificate usage rule compliance" to organizational standards., CC ID: 08492
Configure the "Allow enhanced PINs for startup" to organizational standards., CC ID: 08495
Configure the "Choose how BitLocker-protected operating system drives can be recovered" to organizational standards., CC ID: 08499
Configure the "Allow access to BitLocker-protected fixed data drives from earlier versions of Windows" to organizational standards., CC ID: 08505
Configure the "Choose how BitLocker-protected fixed drives can be recovered" to organizational standards., CC ID: 08509
Configure the "Configure use of passwords for fixed data drives" to organizational standards., CC ID: 08513
Configure the "Choose drive encryption method and cipher strength" to organizational standards., CC ID: 08537
Configure the "Choose default folder for recovery password" to organizational standards., CC ID: 08541
Configure the "Prevent memory overwrite on restart" to organizational standards., CC ID: 08542
Configure the "Deny write access to removable drives not protected by BitLocker" to organizational standards., CC ID: 08549
Configure the "opt encrypted" flag to organizational standards., CC ID: 14534
Configure the "Provide the unique identifiers for your organization" to organizational standards., CC ID: 08552
Configure the "Enable use of BitLocker authentication requiring preboot keyboard input on slates" to organizational standards., CC ID: 08556
Configure the "Require encryption on device" to organizational standards., CC ID: 08563
Configure the "Enable S/MIME for OWA 2007" to organizational standards., CC ID: 08564
Configure the "Control use of BitLocker on removable drives" to organizational standards., CC ID: 08566
Configure the "Configure use of hardware-based encryption for fixed data drives" to organizational standards., CC ID: 08568
Configure the "Configure use of smart cards on removable data drives" to organizational standards., CC ID: 08570
Configure the "Enforce drive encryption type on operating system drives" to organizational standards., CC ID: 08573
Configure the "Disallow standard users from changing the PIN or password" to organizational standards., CC ID: 08574
Configure the "Use enhanced Boot Configuration Data validation profile" to organizational standards., CC ID: 08578
Configure the "Allow network unlock at startup" to organizational standards., CC ID: 08588
Configure the "Enable S/MIME for OWA 2010" to organizational standards., CC ID: 08592
Configure the "Configure minimum PIN length for startup" to organizational standards., CC ID: 08594
Configure the "Configure TPM platform validation profile" to organizational standards., CC ID: 08598
Configure the "Configure use of hardware-based encryption for operating system drives" to organizational standards., CC ID: 08601
Configure the "Reset platform validation data after BitLocker recovery" to organizational standards., CC ID: 08607
Configure the "Configure TPM platform validation profile for native UEFI firmware configurations" to organizational standards., CC ID: 08614
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives" setting to organizational standards., CC ID: 10039
Configure the "Save BitLocker recovery information to AD DS for fixed data drives" setting to organizational standards., CC ID: 10040
Configure the "Omit recovery options from the BitLocker setup wizard" setting to organizational standards., CC ID: 10041
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for operating system drives" setting to organizational standards., CC ID: 10042
Configure the "Save BitLocker recovery information to AD DS for operating system drives" setting to organizational standards., CC ID: 10043
Configure the "Allow BitLocker without a compatible TPM" setting to organizational standards., CC ID: 10044
Configure the "Do not enable BitLocker until recovery information is stored to AD DS for removable data drives" setting to organizational standards., CC ID: 10045
Configure the "Save BitLocker recovery information to AD DS for removable data drives" setting to organizational standards., CC ID: 10046
SELECTED AUTHORITY DOCUMENTS COMPLIED WITH
Ensure that encryption is enabled for RDS Instances Description: Amazon RDS encrypted DB instances use the industry standard AES-256 encryption algorithm to encrypt your data on the server that hosts your Amazon RDS DB instances. After your data is encrypted, Amazon RDS handles authentication of acc… (2.3.1, CIS Amazon Web Services Foundations Benchmark, v1.4.0, Level 1)
Ensure that encryption is enabled for RDS Instances Description: Amazon RDS encrypted DB instances use the industry standard AES-256 encryption algorithm to encrypt your data on the server that hosts your Amazon RDS DB instances. After your data is encrypted, Amazon RDS handles authentication of acc… (2.3.1, CIS Amazon Web Services Foundations Benchmark, v1.4.0, Level 2)
Ensure all S3 buckets employ encryption-at-rest Description: Amazon S3 provides a variety of no, or low, cost encryption options to protect data at rest. Rationale: Encrypting data at rest reduces the likelihood that it is unintentionally exposed and can nullify the impact of disclosure if the encry… (2.1.1, CIS Amazon Web Services Foundations Benchmark, v1.4.0, Level 2)
Ensure system-wide crypto policy is not over-ridden Description: System-wide Crypto policy can be over-ridden or opted out of for openSSH Rationale: Over-riding or opting out of the system-wide crypto policy could allow for the use of less secure Ciphers, MACs, KexAlgoritms and GSSAPIKexAlgorithsm R… (5.2.20, CIS Oracle Linux 8 Benchmark, Server Level 1, v1.0.1)
Ensure system-wide crypto policy is not legacy Description: The system-wide crypto-policies followed by the crypto core components allow consistently deprecating and disabling algorithms system-wide. The individual policy levels (DEFAULT, LEGACY, FUTURE, and FIPS) are included in the crypto-policies… (1.10, CIS Oracle Linux 8 Benchmark, Server Level 1, v1.0.1)
Ensure system-wide crypto policy is not over-ridden Description: System-wide Crypto policy can be over-ridden or opted out of for openSSH Rationale: Over-riding or opting out of the system-wide crypto policy could allow for the use of less secure Ciphers, MACs, KexAlgoritms and GSSAPIKexAlgorithsm R… (5.2.20, CIS Oracle Linux 8 Benchmark, Server Level 2, v1.0.1)
Ensure system-wide crypto policy is not legacy Description: The system-wide crypto-policies followed by the crypto core components allow consistently deprecating and disabling algorithms system-wide. The individual policy levels (DEFAULT, LEGACY, FUTURE, and FIPS) are included in the crypto-policies… (1.10, CIS Oracle Linux 8 Benchmark, Server Level 2, v1.0.1)
Ensure system-wide crypto policy is FUTURE or FIPS Description: The system-wide crypto-policies followed by the crypto core components allow consistently deprecating and disabling algorithms system-wide. The individual policy levels (DEFAULT, LEGACY, FUTURE, and FIPS) are included in the crypto-poli… (1.11, CIS Oracle Linux 8 Benchmark, Server Level 2, v1.0.1)
Enable user authentication and encryption mechanisms for the management interface of the AP. (§ 5.13.1.1 ¶ 2 5., Criminal Justice Information Services (CJIS) Security Policy, CJISD-ITS-DOC-08140-5.9.1, Version 5.9.1)