UCF STIG Viewer Logo

The information system must connect to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27056 SRG-APP-NA SV-34351r1_rule Medium
Description
Managed interfaces employing boundary protection devices include: proxies, gateways, routers, firewalls, guards, or encrypted tunnels arranged in an effective security architecture (e.g., routers protecting firewalls and application gateways residing on a protected sub-network commonly referred to as a demilitarized zone or DMZ). This is a boundary control requirement to route traffic through managed firewalls and proxies deployed according to an architectural design. This is a network configuration issue not an application requirement.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None