UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must take organization defined list of least disruptive actions to terminate suspicious events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33282 SRG-OS-000271-NA SV-43701r1_rule Medium
Description
System availability is a key tenet of system security. Organizations need to have the flexibility to be able to define the automated actions taken in response to an identified incident. This includes being able to define a least disruptive action the operating system takes to terminate suspicious events. The least disruptive actions may include initiating a request for human response. Rationale for non-applicability: This vulnerability is better addressed by CCI-001274, which defines "least disruptive" response in this context.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41579r1_chk )
This requirement is NA for the Mobile OS SRG.
Fix Text (F-37212r1_fix)
The requirement is NA. No fix is required.