UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

COEB-2 Enclave Boundary Defense


Overview

Enclave boundary defense at the alternate site must be configured identically to that of the primary site.

MAC / CONF Impact Subject Area
MACI High Continuity

Details

Threat
A securely configured enclave boundary is essential to the maintaining the integrity of a site’s IT systems.  Ensuring the identical configuration of an alternate site assures integrity of operations in the wake of an incident requiring the switch of mission operations to the alternate site.

Guidance
Enclave boundary defense at the alternate site shall be configured identically to that of the primary site.

References

  • DISA Enclave Security STIG, Version 2, Release 1, 01 July 2004
  • DISA Enterprise Security Management STIG, 29 October 2004