UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The changes to the application must be assessed for IA and accreditation impact prior to implementation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-70381 APSC-DV-003200 SV-85003r1_rule Medium
Description
When changes are made to an application, either in the code or in the configuration of underlying components such as the OS or the web or application server, there is the potential for security vulnerabilities to be opened up on the system. IA assessment of proposed changes is necessary to verify security integrity is maintained within the application.
STIG Date
Application Security and Development Security Technical Implementation Guide 2017-12-18

Details

Check Text ( C-70835r1_chk )
Interview the application and system administrators and determine if changes to the application are assessed for IA impact prior to implementation.

Review the CCB process documentation to ensure potential changes to the application are evaluated to determine impact. An informal group may be tasked with impact assessment of upcoming version changes.

If IA impact analysis is not performed, this is a finding.
Fix Text (F-76617r1_fix)
Review IA impact to the system prior to implementing changes.