UCF STIG Viewer Logo

Applications must not share resources used to interface with systems operating at different security levels.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27035 SRG-APP-000244 SV-34329r1_rule Medium
Description
The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Shared resources include, memory, input/output queues, and network interface cards.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None