UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must protect the confidentiality and integrity of system information at rest.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000238-FW-000150 SRG-NET-000238-FW-000150 SRG-NET-000238-FW-000150_rule Low
Description
This requirement is intended to address the confidentiality and integrity of system information at rest (e.g., firewall rule sets or ACLs) when it is located on a storage device within the firewall or as a component of the firewall implementation. This protection is required to prevent unauthorized alteration, corruption, or disclosure of information when not stored directly on the firewall.
STIG Date
Firewall Security Requirements Guide 2012-12-10

Details

Check Text ( C-SRG-NET-000238-FW-000150_chk )
Review the configuration of the firewall implementation. Verify all configuration files, system files, and logs located on storage devices within, or attached to, firewall components protect the confidentiality and integrity of the stored information.

If the firewall implementation does not protect the confidentiality and integrity of data at rest, this is a finding.
Fix Text (F-SRG-NET-000238-FW-000150_fix)
Enable integrity and confidentiality protection for stored information.