UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization must encrypt all network device configurations while stored offline.


Overview

Finding ID Version Rule ID IA Controls Severity
V-23735 NET1050 SV-28616r3_rule Medium
Description
If a network device's non-volatile memory is lost without a recent configuration stored in an offline location, it may take time to recover that segment of the network. Users connected directly to the switch or router will be without service for a longer than acceptable time. Encrypting the configuration stored offline protects the data at rest and provides additional security to prevent tampering and potentially cause a network outage if the configuration were to be put into service.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2019-12-10

Details

Check Text ( C-28855r4_chk )
Inspect the network element configurations that have been stored offline.

If the configurations are not encrypted, this is a finding.
Fix Text (F-25887r3_fix)
Encrypt all network device configurations stored offline.