UCF STIG Viewer Logo

The network element must use cryptographic mechanisms to protect and restrict access to information on portable digital media.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34696 SRG-NET-000179-IDPS-NA SV-45581r1_rule Low
Description
When data is written to portable digital media, there is the risk of loss of data along with integrity and data confidentiality. An organizational assessment of risk guides the selection of media and associated information contained on the media requiring restricted access. Organizations document in policy and procedures, the media requiring restricted access, individuals authorized to access the media, and the specific measures taken to restrict access. Fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact if accessed by other than authorized personnel. In these situations, it is assumed the physical access controls where the media resides provide adequate protection. Neither physical nor cryptographic protection of portable digital media is a function of the IDPS application. This function is performed by the underlying OS.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42935r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-38978r1_fix)
This requirement is NA for IDPS. No fix required.