UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must implement host-based boundary protection mechanisms.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000196-NDM-NA SRG-NET-000196-NDM-NA SRG-NET-000196-NDM-NA_rule Low
Description
A host-based boundary protection mechanism is a host-based network device. Host-based boundary protection mechanisms are employed on devices to protect the asset where the data resides and to inspect data that has been decrypted. Host-based network devices also allow for finer granularity when determining which ports, protocols, and services need to be enabled on a system-by-system basis. Without a host-based protection mechanism, the network device may not have adequate protection against attacks that may not be detected at the perimeter network device. Host-based boundary protection is outside the scope of network device management. Installation of a host-based network device on the network device itself may impact the operation of the network device.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000196-NDM-NA_chk )
This requirement is NA for network device management.
Fix Text (F-SRG-NET-000196-NDM-NA_fix)
This requirement is NA for network device management.