UCF STIG Viewer Logo

The operating system must implement detection and inspection mechanisms to identify unauthorized mobile code.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33172 SRG-OS-000180-NA SV-43570r1_rule Medium
Description
Decisions regarding the employment of mobile code within operating systems are based on the potential for the code to cause damage to the system if used maliciously. Rationale for non-applicability: Mobile code protections are addressed in the Mobile Applications SRG.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41433r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37072r1_fix)
The requirement is NA. No fix is required.