UCF STIG Viewer Logo

The network element must not allow users to introduce removable media into the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34767 SRG-NET-000254-IDPS-NA SV-45691r1_rule Low
Description
Malicious code includes viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. They also have the ability to run and attach programs, which provides a high risk potential for the distribution of malicious mobile code. Malicious code can be transported by electronic mail, mail attachments, web accesses, and removable media. This control pertains to anti-virus products which are out of scope.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43057r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-39089r1_fix)
This requirement is NA for IDPS. No fix required.