UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Protections against DoS attacks must be implemented.


Overview

Finding ID Version Rule ID IA Controls Severity
V-70413 APSC-DV-003320 SV-85035r1_rule Medium
Description
Known DoS threats documented in the threat model should be mitigated, to prevent DoS type attacks.
STIG Date
Application Security and Development Security Technical Implementation Guide 2019-09-30

Details

Check Text ( C-70867r1_chk )
Ask the application representative for the threat model document.

Examine the threat model document and determine if DoS attacks are specified as a threat.

If there are no DoS threats identified in the threat model, the requirement is not applicable.

Verify the mitigations provided for DoS attacks are implemented from the threat model.

If mitigations for DoS attacks are identified in the threat model but are not implemented, this is a finding.
Fix Text (F-76649r1_fix)
Implement mitigations from the threat model for DOS attacks.