Skip to main content
CUI

Documentation - V-222645

V-222645

Application Security and Development Security Technical Implementation Guide

CAT II

Title

Application files must be cryptographically hashed prior to deploying to DoD operational networks.

Description

<VulnDiscussion>When application code and binaries are transferred from one environment to another, there is the potential for malware to be introduced into either the application code or even the application binaries themselves. Care must be taken to ensure that application code and binaries are validated for integrity prior to deployment into a production environment. To ensure file integrity, application files and/or application packages are cryptographically hashed using a strong hashing al...

Fix Text (Documentation Requirement)

Developers/release managers create cryptographic hash values of application files and/or application packages prior to transitioning the application from test to a production environment. They protect cryptographic hash information so it cannot be altered and make a read copy of the hash information available to application Admins so they can validate application packages and files after they download the files. Application Admins validate cryptographic hashes prior to deploying the application to production.

Documentation Status

Cancel
CUI