-
Story
-
Resolution: Unresolved
-
Medium
-
None
-
None
Original:
ONAP MUST NOT use compromised encryption algorithms. For example, SHA, DSS, MD5, SHA-1 and Skipjack algorithms. Acceptable algorithms can be found in the NIST FIPS publications (https://csrc.nist.gov/publications/fips) and in the NIST Special Publications (https://csrc.nist.gov/publications/sp).
This requirement is removed, because it is covered by CII badging section "use basic, good cryptographic practices"