UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server, when transferring information between different security domains, must decompose information into policy-relevant subcomponents for submission to policy enforcement mechanisms.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35529 SRG-APP-000044-AS-NA SV-46816r1_rule Medium
Description
Specific examples of flow control enforcement can be found in boundary protection devices (e.g., proxies, gateways, guards, encrypted tunnels, firewalls, and routers) employing rule sets or establishing configuration settings restricting information system services, or providing a packet-filtering capability based on header information or message-filtering capability based on content (e.g., using key word searches or document characteristics). Policy rules for cross domain transfers include, limitations on embedding components/information types within other components/information types, prohibiting more than two-levels of embedding, and prohibiting the transfer of archived information types. Information flow control only applies to a CDS. An AS is not a CDS.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43869r1_chk )
This requirement is NA for the AS SRG.
Fix Text (F-40070r1_fix)
This requirement is NA. No fix is required.