UCF STIG Viewer Logo

The operating system must protect the confidentiality and integrity of all information at rest.


Overview

Finding ID Version Rule ID IA Controls Severity
V-203661 SRG-OS-000185-GPOS-00079 SV-203661r557230_rule Medium
Description
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. This requirement addresses protection of user-generated data, as well as operating system-specific configuration data. Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate, in accordance with the security category and/or classification of the information.
STIG Date
General Purpose Operating System Security Requirements Guide 2022-06-06

Details

Check Text ( C-3786r557228_chk )
Verify the operating system protects the confidentiality and integrity of all information at rest. If it does not, this is a finding.
Fix Text (F-3786r557229_fix)
Configure the operating system to protect the confidentiality and integrity of all information at rest.