Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26725 | SRG-NET-000017 | SV-33968r1_rule | Medium |
Description |
---|
Access control policies (e.g., identity-based policies, role-based policies, etc.) and access enforcement mechanisms (e.g., access control lists, policy maps, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, data, destination addresses, etc.) within the network. |
STIG | Date |
---|---|
Network Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |