Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-30570 | SRG-APP-000140 | SV-40299r1_rule | Medium |
Description |
---|
Applications that provide remote access to information systems must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Examples of policy requirements include but are not limited to; authorizing remote access to the information system, limiting access based on authentication credentials and monitoring for unauthorized access. |
STIG | Date |
---|---|
Application Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |