UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must monitor for unauthorized connections of mobile devices to organizational information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35480 SRG-APP-000021-AS-NA SV-46767r1_rule Medium
Description
Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and communications devices with information storage capability (e.g., notebook/laptop computers, personal digital assistants, cellular telephones, digital cameras, and audio recording devices). In order to detect unauthorized mobile device connections, organizations must first identify and document what mobile devices are authorized. Monitoring for unauthorized connections is usually handled by configuration management software, log alarming, IDS, or some other security mechanism specifically designed to automate and address this requirement. Application servers do not manage mobile devices. They could host the applications that perform mobile management tasks, but do not have mobile management capabilities.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43833r1_chk )
This requirement is NA for the AS SRG.
Fix Text (F-40021r1_fix)
is requirement is NA. No fix is required.