UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must protect the integrity of applications during the processes of data aggregation, packaging, and transformation in preparation for deployment.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35432 SRG-APP-000239-AS-000162 SV-46719r1_rule Low
Description
Information can be subjected to unauthorized changes (e.g., malicious and/or unintentional modification) at information aggregation or protocol transformation points. It is therefore imperative the application take steps to validate and assure the integrity of data while at these stages of processing. The application server must ensure the integrity of data that is pending transfer for deployment is maintained. If the application were to simply transmit aggregated, packaged or transformed data without ensuring the data was not manipulated during these processes, then the integrity of the data and the application itself may be called into question.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43783r1_chk )
Review the AS configuration to ensure the system is protecting the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission. If the AS is not configured in this fashion, this is a finding.
Fix Text (F-39976r1_fix)
Configure the AS to protect the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission.