Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26952 | SRG-APP-000134 | SV-34235r1_rule | Medium |
Description |
---|
Any changes to the application components of the information system can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals shall be allowed to obtain access to the application components for purposes of initiating changes, including upgrades and modifications. In order to ensure a prompt response to unauthorized changes to application security functions or security mechanisms, organizations may define countermeasures and safeguards that monitoring applications must undertake in the event these types of changes occur. This degree of functionality is typically built into a support architecture providing change management and/or system monitoring capabilities. Automatic implementation of safeguards and countermeasures includes: reversing the change; halting the system; or triggering an audit alert when an unauthorized modification to a critical security file or process occurs. Examples of such support architecture include but are not limited to: HIDS, change management software or file/process monitoring software. |
STIG | Date |
---|---|
Application Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |