UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Program Manager and Designer will ensure the use of new IPs, data services, and associated ports used by the application are submitted to the appropriate approving authority for that organization, which in turn are submitted through the DoD Ports, Protocols, and Services Management (DoD PPSM).


Overview

Finding ID Version Rule ID IA Controls Severity
V-6169 APP2100 SV-6169r2_rule DCPP-1 Medium
Description
Failure to comply with DoD Ports, Protocols, and Services (PPS) Vulnerability Analysis and associated PPS mitigations may result in compromise of enclave boundary protections and/or functionality of the application.
STIG Date
Application Security and Development Checklist 2014-12-22

Details

Check Text ( C-2964r1_chk )
All application ports, protocols, and services needed for application operation need to be in compliance with the DoD Ports and Protocols guidance.

Check (http://iase.disa.mil/ports/index.html) to ensure the ports, protocols, and services are in compliance with the PPS CAL.

Check all necessary ports and protocols needed for application operation (only those accessed from outside the local enclave) are checked against the DoD Ports and Protocols guidance to ensure compliance.

Identify the ports needed for the application:
• Look at System Security Plan/Accreditation documentation
• Ask System Administrator
• Go to Network Administrator Retina Scanner
• Go to Network Reviewer
• If a network scan is available, use it
• Use netstat/task manager
• Check /etc/services

1) If the application is not in compliance with DoD Ports and Protocols guidance, it is a finding.
Fix Text (F-4481r1_fix)
Ensure your Accreditation documentation lists all interfaces and the ports, protocols, and services used. Ensure that all ports, protocols, and services are used in accordance with the DoD PPSM.