UCF STIG Viewer Logo

Applications must provide automated support for the management of distributed security testing.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27135 SRG-APP-000263 SV-34434r1_rule Medium
Description
The need to verify security functionality applies to all security functions. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include: startup, restart, shutdown, and abort.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None