UCF STIG Viewer Logo

Applications must respond to security function anomalies in accordance with organization-defined responses and alternative action(s).


Overview

Finding ID Version Rule ID IA Controls Severity
V-27117 SRG-APP-000200 SV-34414r1_rule Medium
Description
The need to verify security functionality applies to all security functions. For those security functions not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include, startup, restart, shutdown, and abort.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None