UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

If the network device uses mandatory access control, the network device must enforce organization-defined mandatory access control policies over all subjects and objects.


Overview

Finding ID Version Rule ID IA Controls Severity
V-202120 SRG-APP-000491-NDM-000316 SV-202120r400750_rule Medium
Description
Mandatory access control policies constrain what actions subjects can take with information obtained from data objects for which they have already been granted access, thus preventing the subjects from passing the information to unauthorized subjects and objects. This class of mandatory access control policies also constrains what actions subjects can take with respect to the propagation of access control privileges; that is, a subject with a privilege cannot pass that privilege to other subjects. Enforcement of mandatory access control is typically provided via an implementation that meets the reference monitor concept. The reference monitor enforces (mediates) access relationships between all subjects and objects based on privilege and need to know. The mandatory access control policies are defined uniquely for each network device, so they cannot be specified in the requirement. An example of where mandatory access control may be needed is to prevent administrators from tampering with audit objects.
STIG Date
Network Device Management Security Requirements Guide 2021-03-16

Details

Check Text ( C-2246r382040_chk )
Check the network device to determine if organization-defined mandatory access control policies are enforced over all subjects and objects. If it does not use mandatory access control, this is not a finding.

If organization-defined mandatory access control policies are not enforced over all subjects and objects, this is a finding.
Fix Text (F-2247r382041_fix)
Configure the network device to enforce organization-defined mandatory access control policies over all subjects and objects.