- Windows
- Linux
- Windows
- Linux
- Windows
- Cipher Suites
- Windows Vista / Windows Server 2008
- Windows Server 2008 with Service Pack 2 (SP2)
- Windows 7 / Windows Server 2008 R2
- Windows 8 / Windows Server 2012
- Windows 8.1 / Windows Server 2012 R2
- Windows 10, version 1507
- Windows 10, version 1511
- Windows 10, version 1607 / Windows Server 2016 Standard
- Windows 10, version 1703
- Windows 10, version 1709
- Windows 10, version 1803
- Windows 10, version 1809 / Windows Server 2019
- Windows 10, version 1903
- Windows 10, version 1909
- Windows 10, version 2004
- Windows 10, version 20H2
- Windows 10, version 21H1
- Windows Server 2022
- Cipher Suites
- Apache
- Nginx
SSH Server CBC Mode Ciphers Enabled / CIS 1.6.3 Ensure system wide crypto policy disables cbc for ssh
Create or edit a file in /etc/crypto-policies/policies/modules/NO-CBC.pmod
and add or modify one of the the following lines:
cipher@SSH = -*-CBC # Disables the CBC cipher for SSH
-OR-
cipher = -*-CBC # Disables the CBC cipher
Run the following command to update the system-wide cryptographic policy
update-crypto-policies --set DEFAULT:NO-CBC
Run the following command to reboot the system to make your cryptographic settings effective for already running services and applications:
reboot
SSH Weak Key Exchange Algorithms Enabled / CIS 1.6.2 Ensure system wide crypto policy disables sha1 hash and signature support
Create or edit a file in /etc/crypto-policies/policies/modules/NO-SHA1.pmod
and add or modify the following lines:
hash = -SHA1
sign = -*-SHA1
sha1_in_certs = 0
Run the following command to update the system-wide cryptographic policy
update-crypto-policies --set DEFAULT:NO-SHA1
Run the following command to reboot the system to make your cryptographic settings effective for already running services and applications:
reboot
Create or edit a file in /etc/crypto-policies/policies/modules/NO-WEAKMAC.pmod
and add or modify the following lines:
mac = -*-64* # Disables weak macs
Run the following command to update the system-wide cryptographic policy
update-crypto-policies --set DEFAULT:NO-WEAKMAC
Run the following command to reboot the system to make your cryptographic settings effective for already running services and applications:
reboot
nmap -sV -p <port> --script ssl-enum-ciphers <ip>
- Security Headers
- Content Security Policy
- HTTP Strict Transport Security
- X-Content-Type-Options
- X-Frame-Options
- X-Xss-Protection