Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27135 | SRG-APP-000263 | SV-34434r1_rule | Medium |
Description |
---|
The need to verify security functionality applies to all security functions. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include: startup, restart, shutdown, and abort. |
STIG | Date |
---|---|
Application Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |