
* Docs are now ordered by STIG ID number to make them easier to browse. * Deployer notes are better organized. * Script + CSV added for automated documentation generation. Implements: blueprint security-hardening Change-Id: Ib87bec701eddf1601574f4e027f301c775e5e1cd
16 lines
797 B
ReStructuredText
16 lines
797 B
ReStructuredText
V-38662: The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of data at rest unless otherwise protected by alternative physical measures.
|
|
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
|
|
|
|
The risk of a system's physical compromise, particularly mobile systems such
|
|
as laptops, places its data at risk of compromise. Encrypting this data
|
|
mitigates the risk of its loss if the system is lost.
|
|
|
|
Details: `V-38662 in STIG Viewer`_.
|
|
|
|
.. _V-38662 in STIG Viewer: https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2015-05-26/finding/V-38662
|
|
|
|
Notes for deployers
|
|
~~~~~~~~~~~~~~~~~~~
|
|
|
|
.. include:: developer-notes/V-38662.rst
|