UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must enforce requirements for remote connections to the network.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000068-NDM-000047 SRG-NET-000068-NDM-000047 SRG-NET-000068-NDM-000047_rule Low
Description
Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, dial-up, broadband, and wireless. Virtual private networks (VPNs), when adequately provisioned with appropriate security controls, are considered internal networks, rather than a remote access method. Enabling access to the network from outside introduces security risks which must be addressed through implementation of strict controls and procedures, such as authentication and defining what resources can be accessed.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000068-NDM-000047_chk )
Verify remote access connections enforce authentication requirements. If the remote access connections do not enforce authentication requirements, this is a finding.
Fix Text (F-SRG-NET-000068-NDM-000047_fix)
Configure the network device to authenticate remote access connections.