DISA STIGS Viewer

The .NET CLR must be configured to use FIPS approved encryption modules.

Overview

Finding ID Version Rule ID IA Controls Severity
V-225230 APPNET0062 SV-225230r961908_rule   Medium
Description
STIG Date
Microsoft DotNet Framework 4.0 Security Technical Implementation Guide 2025-05-16

Details

Check Text (C-26929r468005_chk)

Examine the .NET CLR configuration files from the vulnerability discussion to find the runtime element and then the "enforceFIPSPolicy" element.

Example:
<configuration>
<runtime>
<enforceFIPSPolicy enabled="true|false" />
</runtime>
</configuration>

By default, the .NET "enforceFIPSPolicy" element is set to "true".

If the "enforceFIPSPolicy" element does not exist within the "runtime" element of the CLR configuration, this is not a finding.

If the "enforceFIPSPolicy" element exists and is set to "false", and the IAO has not accepted the risk and documented the risk acceptance, this is a finding.

Fix Text (F-26917r468006_fix)
Examine the .NET CLR configuration files to find the runtime element and then the "enforceFIPSPolicy" element.

Example:
<configuration>
<runtime>
<enforceFIPSPolicy enabled="true|false" />
</runtime>
</configuration>

Delete the "enforceFIPSPolicy" runtime element, change the setting to "true" or there must be documented IAO approvals for the FIPS setting.