Major Hayden a676e37a84 Docs overhaul
* Docs are now ordered by STIG ID number to make them easier to browse.
* Deployer notes are better organized.
* Script + CSV added for automated documentation generation.

Implements: blueprint security-hardening

Change-Id: Ib87bec701eddf1601574f4e027f301c775e5e1cd
2015-10-14 13:42:52 +00:00

16 lines
797 B
ReStructuredText

V-38662: The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of data at rest unless otherwise protected by alternative physical measures.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The risk of a system's physical compromise, particularly mobile systems such
as laptops, places its data at risk of compromise. Encrypting this data
mitigates the risk of its loss if the system is lost.
Details: `V-38662 in STIG Viewer`_.
.. _V-38662 in STIG Viewer: https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/2015-05-26/finding/V-38662
Notes for deployers
~~~~~~~~~~~~~~~~~~~
.. include:: developer-notes/V-38662.rst