UCF STIG Viewer Logo

The application must support the enforcement of a two-person rule for changes to organization-defined application components and system-level information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26946 SRG-APP-000132 SV-34228r1_rule Medium
Description
Regarding access restrictions for changes made to organization defined information system components and system level information. Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals are allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications. A two person rule requires two separate individuals acknowledge and approve those changes. Two person rule for changes to critical application components helps to reduce risks pertaining to availability and integrity.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None