UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must employ automated mechanisms to detect the addition of unauthorized components or devices.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000134-FW-NA SRG-NET-000134-FW-NA SRG-NET-000134-FW-NA_rule Medium
Description
This requirement addresses configuration management of the network element as well as detection of unauthorized devices on the network. The network element must automatically detect the installation of unauthorized software or hardware onto the device itself. Monitoring may be accomplished on an ongoing basis or by periodic monitoring. Automated mechanisms can be implemented within the network element and/or in another separate information system or device. This is not a native function of the firewall. However, there is a DoD requirement to employ an automated mechanism within the organization to detect the addition of unauthorized devices, including firewalls.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000134-FW-NA_chk )
This requirement is NA for firewall. No fix required.
Fix Text (F-SRG-NET-000134-FW-NA_fix)
This requirement is NA for firewall. No fix required.