Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27094 | SRG-APP-NA | SV-34389r1_rule | Medium |
Description |
---|
Anomalies within the information system include, for example, large file transfers, long-time persistent connections, unusual protocols and ports in use, and attempted communications with suspected malicious external addresses. This is a requirement to analyze outbound traffic at selected interior points. This does not apply to applications. |
STIG | Date |
---|---|
Application Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |