FIPS 140-2/140-3 mode must be enabled on SLEM 5.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-261473 | SLEM-05-671010 | SV-261473r996824_rule | CCI-002450 | high |
| Description | ||||
| Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. SLEM 5 must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. | ||||
| STIG | Date | |||
| SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2025-05-08 | |||
Details
Check Text (C-261473r996824_chk)
Verify SLEM 5 is running in FIPS mode by running the following command.
> cat /proc/sys/crypto/fips_enabled
1
If the value returned is "0", nothing is returned, or the file does not exist, this is a finding.
Fix Text (F-65110r996823_fix)
To configure SLEM 5 to run in FIPS mode, add "fips=1" to the kernel parameter during SLEM 5 install.
Enabling FIPS mode on a preexisting system involves a number of modifications to SLEM 5. Refer to section 9.1, "Crypto Officer Guidance", of the following document for installation guidance:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2435.pdf