System initialization, shutdown, and aborts are configured to ensure that the system remains in a secure state.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACIII | High | Security Design and Configuration |
Threat |
---|
When systems are in a state of transition, they may be susceptible to unauthorized access or to attack. Â Means shall be employed to ensure unauthorized changes to the system state are not allowed during transition. |
Guidance |
---|
1. Identify system transition states and refer to appropriate DISA, NSA, or other approved security technical implementation guide for specific configuration guidance. |