UCF STIG Viewer Logo

The application must be capable of implementing host-based boundary protection mechanisms for servers, workstations, and mobile devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27043 SRG-APP-000250 SV-34338r1_rule Medium
Description
A host-based boundary protection mechanism is a host-based firewall. Host-based boundary protection mechanisms are employed on mobile devices, such as notebook/laptop computers, and other types of mobile devices where such boundary protection mechanisms are available.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None