UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The FA will ensure that if the firewall product operates on an OS platform, the host must be STIG compliant prior to the installation of the firewall product.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4619 NET0379 SV-4619r1_rule DCCS-1 DCCS-2 ECSC-1 Medium
Description
If the host that a firewall engine is operating on is not secured, the firewall itself is exposed to greater risk.
STIG Date
Firewall Security Technical Implementation Guide 2013-10-08

Details

Check Text ( C-3674r1_chk )
Review documentation that the OS was STIG compliant prior to firewall installation and that the appropriate patches have been applied that address all IAVAs.
Fix Text (F-4552r1_fix)
The firewall administrator will install all patches that address IAVA.