UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization must analyze outbound communications traffic at the external boundary of the system (i.e., system perimeter).


Overview

Finding ID Version Rule ID IA Controls Severity
V-27093 SRG-APP-NA SV-34388r1_rule Medium
Description
Anomalies within the information system include, for example, large file transfers, long-time persistent connections, unusual protocols and ports in use, and attempted communications with suspected malicious external addresses. This is a requirement to analyze outbound traffic. This does not apply to applications.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None