UCF STIG Viewer Logo

The system must use an access control program.


Overview

Finding ID Version Rule ID IA Controls Severity
V-940 GEN006580 SV-35198r1_rule EBRU-1 Medium
Description
Access control programs (such as TCP_WRAPPERS) provide the ability to enhance system security posture.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2017-01-27

Details

Check Text ( None )
None
Fix Text (F-30334r1_fix)
Edit /etc/inetd.conf and use tcpd to wrap active services.