System initialization, shutdown, and aborts are configured to ensure that the system remains in a secure state.
MAC / CONF
Security Design and Configuration
When systems are in a state of transition, they may be susceptible to unauthorized access or to attack. Means shall be employed to ensure unauthorized changes to the system state are not allowed during transition.
1. Identify system transition states and refer to appropriate DISA, NSA, or other approved security technical implementation guide for specific configuration guidance.
Refer to application-specific DoD, DISA, & NSA STIG
DoDI 8551.1, Ports, Protocols, and Services Management (PPSM), 13 August 2004
DoDI 8500.2, Information Assurance (IA) Implementation, para. E3.2.4, E3.2.6, 06 February 2003