UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

DCSS-2 System State Changes


Overview

System initialization, shutdown, and aborts are configured to ensure that the system remains in a secure state. Tests are provided and periodically run to ensure the integrity of the system state.

MAC / CONF Impact Subject Area
CLASSIFIED MACI
MACII
High Security Design and Configuration

Details

Threat
When systems are in a state of transition they may be susceptible to unauthorized access or to attack.  Means shall be employed to ensure unauthorized changes to the system state are not allowed during transition.

Guidance
1. Identify system transition states and refer to appropriate DISA, NSA, or other approved security technical implementation guide for specific configuration guidance.

References

  • Refer to application-specific DoD, DISA, & NSA STIG
  • DoDI 8551.1, Ports, Protocols, and Services Management (PPSM), 13 August 2004
  • DoDI 8500.2, Information Assurance (IA) Implementation, para. E3.2.4, E3.2.6, 06 February 2003