UCF STIG Viewer Logo

Boundary protection applications must fail securely in the event of an operational failure.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32558 SRG-APP-000254-DB-NA SV-42895r1_rule Medium
Description
Fail secure is a condition achieved by the application of a set of information system mechanisms to ensure that in the event of an operational failure of a boundary protection device at a managed interface (e.g., router, firewall, guard, application gateway residing on a protected sub network commonly referred to as a demilitarized zone), the system does not enter into an unsecure state where intended security properties no longer hold. A failure of a boundary protection device cannot lead to, or cause information external to the boundary protection device to enter the device, nor can a failure permit unauthorized information release. This requirement applies to applications designed for boundary protection and is NA for databases.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40997r1_chk )
This check is NA for databases.
Fix Text (F-36473r1_fix)
This fix is NA for databases.