STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Virtual Private Network (VPN) Security Requirements Guide

V-279024

CAT II (Medium)

The VPN Gateway must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.

Rule ID

SV-279024r1138059_rule

STIG

Virtual Private Network (VPN) Security Requirements Guide

Version

V3R4

CCIs

CCI-002421

Discussion

Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, VPN Gateways need to leverage transmission protection mechanisms, such as TLS, TLS VPNs, or IPSEC. This requirement also applies to Zero Trust initiatives.

Check Content

Determine if the VPN Gateway implements cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.

If the VPN Gateway does not implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission, this is a finding.

Fix Text

Configure the VPN Gateway to implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.