UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must validate the integrity of security attributes exchanged between information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000226-NDM-NA SRG-NET-000226-NDM-NA SRG-NET-000226-NDM-NA_rule Medium
Description
This control ensures the integrity of security attributes. The network device must include content inspection and filtering of both the data payload and the metadata (security attributes) associated with the data. This inspection is often performed first by a packet level network device and then by a separate application network device (also called a proxy or gateway). It is crucial these attributes are subjected to the same rigorous content filtering as the data payload in order to ensure access control and flow control policies are properly implemented. Association of security attributes with information is not a function of network device management.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000226-NDM-NA_chk )
This requirement is NA for network device management.
Fix Text (F-SRG-NET-000226-NDM-NA_fix)
This requirement is NA for network device management.