UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must protect against or must limit the effects of the organization defined or referenced types of Denial of Service attacks.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33121 SRG-OS-000140-NA SV-43519r1_rule Medium
Description
A variety of technologies exist to limit, or in some cases, eliminate the effects of Denial of Service (DoS) attacks. When it comes to DoS attacks, most attention is paid to ensuring the systems and applications are not victims of these attacks. Rationale for non-applicability: Resource constraints on mobile devices preclude implementation of this specific IA function. The applicability of this control may be reconsidered at a future date if subsequent generations of mobile devices are better able to support this control. Carriers are in a much better position to mitigate the risk of and respond to DoS attacks.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41380r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37021r1_fix)
The requirement is NA. No fix is required.