Set minimum size of asymmetric encryption
Summary​
The asymmetric encryption mechanism must use a minimum key size of 2048 bits.
Description​
empty
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🟢 |
Squad | 🟢 |
References​
- CAPECâ„¢-20. Encryption brute forcing
- HIPAA-164_312_a_2_iv. Encryption and decryption (addressable)
- HITRUST CSF-10_g. Key management
- ISO/IEC 27002-8_24. Use of cryptography
- ISA/IEC 62443-DC-4_3. Use of cryptography
- ISSAF-E_21. Network security - Switch security assessment (VLAN reconfiguration)
- ISSAF-F_5_3. Network security - Router security assessment (protect passwords)
- ISSAF-H_14_17. Network security - Intrusion detection (detection engine)
- BSAFSS-EN_2-4. Avoid weak encryption
- OWASP MASVS-V3_1. Cryptography requirements
- OWASP ASVS-6_2_5. Algorithms
- SIG Core-D_6_13. Asset and information management
- OWASP ASVS-6_2_1. Algorithms
- OWASP ASVS-6_2_7. Algorithms
- ISO/IEC 27001-8_24. Use of cryptography
- CASA-6_2_1. Algorithms
- CASA-6_2_5. Algorithms
- CASA-6_2_7. Algorithms
Vulnerabilities​
- 016. Insecure encryption algorithm - SSL/TLS
- 052. Insecure encryption algorithm
- 092. Insecure encryption algorithm - Anonymous cipher suites
- 094. Insecure encryption algorithm - Cipher Block Chaining
- 133. Insecure encryption algorithm - Perfect Forward Secrecy
- 261. Insecure encryption algorithm - DSA
- 262. Insecure encryption algorithm - SHA1
- 263. Insecure encryption algorithm - MD5
- 264. Insecure encryption algorithm - TripleDES
- 265. Insecure encryption algorithm - AES
- 269. Insecure encryption algorithm - Blowfish
- 282. Insecure encryption algorithm - ECB
- 421. Insecure encryption algorithm - Insecure Elliptic Curve
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.