UCF STIG Viewer Logo

A host-based firewall must be installed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-51339 OSX8-00-00795 SV-65549r1_rule Medium
Description
Access into an organization's internal network and to key internal boundaries must be tightly controlled and managed. In the case of the operating system, the key boundary may be the workstation on the public internet.
STIG Date
Apple OS X 10.8 (Mountain Lion) Workstation STIG 2015-02-10

Details

Check Text ( C-53685r1_chk )
Ask the SA or IAO if an approved firewall is loaded on the system. The recommended system is the McAfee HBSS. If there is no local firewall installed on the system, this is a finding.
Fix Text (F-56135r1_fix)
Install an approved HBSS or firewall solution onto the system.