UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must respond to security function anomalies in accordance with organizationally defined responses and alternative actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37317 SRG-NET-000268-FW-000147 SV-49078r1_rule Medium
Description
Verification of security functionality is necessary to ensure the system's defenses are enabled. These anomalies are detected by running self-tests on each component in the firewall. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Upon detection of security function anomalies or failure of automated self-tests, the firewall implementation must respond in accordance with organizationally defined responses and alternative actions. If security functionality is not verified, the system could become compromised without the knowledge of the system administrators. If automated self-tests are not available for all devices, then implement one of the following alternatives: (i) Document the risk as accepted. (ii) Provide and document manual testing procedures.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45565r1_chk )
Verify automated self-tests are configured to take action if a firewall failure is detected.

If the system is not configured to respond to security function anomalies in accordance with organizationally defined responses and alternative actions, this is a finding.
Fix Text (F-42242r1_fix)
Enable automation self-test failure action (e.g., state change, alerts, or alarms) for the firewall.