Details
OL 8 systems handling data requiring ‘data-at-rest’ protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Selection of a cryptographic mechanism is based on the need to protect the integrity of organizational information. The strength of the mechanism is commensurate with the security category and/or classification of the information. Organizations have the flexibility to either encrypt all information on storage devices (i.e., full disk encryption) or encrypt specific data structures (e.g., files, records, or fields).
Satisfies: SRG-OS-000185-GPOS-00079, SRG-OS-000404-GPOS-00183, SRG-OS-000405-GPOS-00184
Solution
Configure OL 8 to prevent unauthorized modification of all information at rest by using disk encryption.
Encrypting a partition in an already-installed system is more difficult because existing partitions will need to be resized and changed.
To encrypt an entire partition, dedicate a partition for encryption in the partition layout.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Unix.
References
- 800-53|SC-28
- 800-53|SC-28(1)
- CAT|I
- CCI|CCI-001199
- CCI|CCI-002475
- CCI|CCI-002476
- Rule-ID|SV-248525r779141_rule
- STIG-ID|OL08-00-010030
- Vuln-ID|V-248525