UCF STIG Viewer Logo

DCSS-1 System State Changes


System initialization, shutdown, and aborts are configured to ensure that the system remains in a secure state.

MAC / CONF Impact Subject Area
MACIII High Security Design and Configuration


When systems are in a state of transition, they may be susceptible to unauthorized access or to attack.  Means shall be employed to ensure unauthorized changes to the system state are not allowed during transition.

1. Identify system transition states and refer to appropriate DISA, NSA, or other approved security technical implementation guide for specific configuration guidance.


  • Refer to application-specific DoD, DISA, & NSA STIG
  • DoDI 8551.1, Ports, Protocols, and Services Management (PPSM), 13 August 2004
  • DoDI 8500.2, Information Assurance (IA) Implementation, para. E3.2.4, E3.2.6, 06 February 2003