UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must support and maintain the binding of organizationally defined security attributes to information in transmission.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000056-NDM-000039 SRG-NET-000056-NDM-000039 SRG-NET-000056-NDM-000039_rule Low
Description
This control requires the support and maintenance of organizationally defined security attributes (a form of metadata). Security attributes are used by information flow control enforcement mechanisms. These attributes are bound to the information in process on the components of the network device. The association of security attributes to data objects in process on the network device is referred to as binding. The security attributes should remain bound as the information is processed. Types of attributes include classification level. An example of an attribute value for this attribute type is Top Secret. Typically, the security attributes used for data stored on the network device is not granular. While the information is processed, the system will limit access based on account permissions. If the security attributes become disassociated from the information being stored, then access control policies and information flows which depend on these security attributes will not function and unauthorized access may result.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000056-NDM-000039_chk )
Verify the network device supports and maintains the binding of organizationally defined security attributes to information in transmission. If the network device does not support and maintain the binding of security attributes to information in transmission, this is a finding.
Fix Text (F-SRG-NET-000056-NDM-000039_fix)
Configure the network device to support and maintain the binding of organizationally defined security attributes to information in transmission.