UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must only allow authorized users to associate security attributes with information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33257 SRG-OS-000246-NA SV-43676r1_rule Medium
Description
The term security label is often used to associate a set of security attributes with a specific information object as part of the data structure for that object (e.g., user access privileges, nationality, affiliation as contractor). A security label is defined as the means used to associate a set of security attributes with a specific information object as part of the data structure for that object. Rationale for non-applicability: Digitally signed attributes on software objects are never modified.
STIG Date
Mobile Operating System Security Requirements Guide 2013-04-12

Details

Check Text ( C-41554r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37187r1_fix)
The requirement is NA. No fix is required.