Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27093 | SRG-APP-NA | SV-34388r1_rule | Medium |
Description |
---|
Anomalies within the information system include, for example, large file transfers, long-time persistent connections, unusual protocols and ports in use, and attempted communications with suspected malicious external addresses. This is a requirement to analyze outbound traffic. This does not apply to applications. |
STIG | Date |
---|---|
Application Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |