UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ALG that is part of a CDS must enforce information flow control based on organization-defined metadata.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000280-ALG-000080 SRG-NET-000280-ALG-000080 SRG-NET-000280-ALG-000080_rule Medium
Description
Enforcing allowed information flows based on metadata enables simpler and more effective flow control. Metadata is information used to describe the characteristics of data. Metadata can include structural metadata describing data structures (e.g., data format, syntax, and semantics) or descriptive metadata describing data contents (e.g., age, location, telephone number). Information flow control regulates where information is allowed to travel within a network and between hosts, as opposed to who is allowed to access the information. Information flow enforcement mechanisms, such as cross domain solutions, compare metadata attached to the data and respond appropriately (e.g., allow, block, quarantine, or alert administrator).
STIG Date
Application Layer Gateway Security Requirements Guide 2014-06-27

Details

Check Text ( C-SRG-NET-000280-ALG-000080_chk )
If the ALG is not part of a CDS, this is not a finding.

Verify that policy filters exist that enforce traffic flow inbound and outbound across the controlled security boundary based on organization-defined metadata.

If the ALG does not control traffic based on organization-defined metadata, this is a finding.
Fix Text (F-SRG-NET-000280-ALG-000080_fix)
Configure inbound or outbound policy filters to enforce traffic flow across the controlled security boundary based on organization-defined metadata.