UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must restrict the ability of individuals to launch denial of service attacks against other information systems or networks.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000192-NDM-NA SRG-NET-000192-NDM-NA SRG-NET-000192-NDM-NA_rule Medium
Description
The network device must prevent individuals from using it as a platform for launching a denial of service attack. Restricting the ability of individuals to launch denial of service attacks requires that the mechanisms used for such attacks be disabled or restricted. Securing the network device at the OS, application, and management interface is vital to mitigate this risk. Providing least privilege, network monitoring using an IDS/IPS; out-of-band management; securing the OS; deleting default passwords; host-based inspection; and auditing are methods for preventing any information system, including network devices, from being used to launch attacks. These features are provided by other controls or guidance for the OS or appropriate technology STIG.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000192-NDM-NA_chk )
This requirement is NA for network device management.
Fix Text (F-SRG-NET-000192-NDM-NA_fix)
This requirement is NA for network device management.