UCF STIG Viewer Logo

The application server must control remote access methods.


Finding ID Version Rule ID IA Controls Severity
V-204782 SRG-APP-000315-AS-000094 SV-204782r850838_rule Medium
Application servers provide remote access capability and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by logging connection activities of remote users. Examples of policy requirements include, but are not limited to, authorizing remote access to the information system, limiting access based on authentication credentials, and monitoring for unauthorized access.
Application Server Security Requirements Guide 2022-09-20


Check Text ( C-4902r282993_chk )
Review organization policy, application server product documentation and configuration to determine if the system enforces the organization's requirements for remote connections.

If the system is not configured to enforce these requirements, or the remote connection settings are not in accordance with the requirements, this is a finding.
Fix Text (F-4902r282994_fix)
Configure the application server to enforce remote connection settings.