UCF STIG Viewer Logo

Boundary protection applications must be capable of preventing public access into the organizations internal networks except as appropriately mediated by managed interfaces.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32559 SRG-APP-000255-DB-NA SV-42896r1_rule Medium
Description
Access into an organization's internal network and to key internal boundaries must be tightly controlled and managed. Applications monitoring and/or controlling communications at the external boundary of the system and at key internal boundaries must be capable of preventing public access into the organization’s internal networks except as appropriately mediated by managed interfaces. This requirement is specific to boundary protection devices. This requirement is NA for databases.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40998r1_chk )
This check is NA for databases.
Fix Text (F-36474r1_fix)
This fix is NA for databases.