UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application server must control remote access methods.


Overview

Finding ID Version Rule ID IA Controls Severity
V-204782 SRG-APP-000315-AS-000094 SV-204782r508029_rule Medium
Description
Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by logging connection activities of remote users. Examples of policy requirements include, but are not limited to, authorizing remote access to the information system, limiting access based on authentication credentials, and monitoring for unauthorized access.
STIG Date
Application Server Security Requirements Guide 2020-09-30

Details

Check Text ( C-4902r282993_chk )
Review organization policy, application server product documentation and configuration to determine if the system enforces the organization's requirements for remote connections.

If the system is not configured to enforce these requirements, or the remote connection settings are not in accordance with the requirements, this is a finding.
Fix Text (F-4902r282994_fix)
Configure the application server to enforce remote connection settings.