UCF STIG Viewer Logo

The network device must protect the integrity of transmitted information.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000207-NDM-000150 SRG-NET-000207-NDM-000150 SRG-NET-000207-NDM-000150_rule Medium
Description
This control applies to information transmitted by the network device application. Preventing the disclosure of information while in transit requires applications to take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS), SSL VPN, or IPSEC tunnel. Without integrity controls, information traveling over commercial networks could be altered or compromised without detection. Alternative physical protection measures include Protected Distribution Systems (PDS). PDS are used to transmit unencrypted classified National Security Information (NSI) through an area of lesser classification or control. Since the classified NSI is unencrypted, the PDS must provide adequate electrical, electromagnetic, and physical safeguards to deter exploitation. Refer to NSTSSI No. 7003 for additional details on a PDS. Network device management traffic and other privileged communications originating from the network device must be protected by integrity mechanisms while in transit (i.e., transmission encryption).
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000207-NDM-000150_chk )
This control does not apply if the information is protected by a physical security solution (e.g., Protective Distribution System [PDS] or physical access control) while in transit.

Inspect the configuration for each network device interface. Verify an integrity mechanism (encryption) is used to check the integrity of information during transit.

If the network device does not protect the integrity of information transmitted, this is a finding.
Fix Text (F-SRG-NET-000207-NDM-000150_fix)
Configure the network device to protect the integrity of transmitted information originating from the network device.