UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must implement an application isolation boundary.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35430 SRG-APP-000236-AS-000160 SV-46717r1_rule Medium
Description
Isolating applications is accomplished by means of an isolation boundary (implemented via partitions and domains) that controls access to, and protects the integrity of, the software that performs security functions. The AS must maintain a separate execution domain (e.g., address space) for each executing process.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43781r1_chk )
Review the AS documentation to determine if the AS provides a virtualized environment for each application instance. If this capability is not performed by the AS, this is a finding.
Fix Text (F-39974r1_fix)
Configure the AS so that each application runs in its own virtualized environment.