UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service attacks.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33123 SRG-OS-000142-NA SV-43521r1_rule Medium
Description
In the case of Denial of Service attacks, care must be taken when designing the operating system so as to ensure the operating system makes the best use of system resources. Rationale for non-applicability: Resource constraints on mobile devices preclude implementation of this specific IA function. The applicability of this control may be reconsidered at a future date if subsequent generations of mobile devices are better able to support this control.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41382r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37023r1_fix)
The requirement is NA. No fix is required.