UCF STIG Viewer Logo

The application must enforce requirements for remote connections to the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-30570 SRG-APP-000140 SV-40299r1_rule Medium
Description
Applications that provide remote access to information systems must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Examples of policy requirements include but are not limited to; authorizing remote access to the information system, limiting access based on authentication credentials and monitoring for unauthorized access.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None