UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The information system must bind security attributes to information to facilitate information flow policy enforcement.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26761 SRG-NET-NA SV-34009r1_rule Medium
Description
Network elements do not transfer data (other than its configuration or image file to and from an FTP or TFTP server) - they merely forward received traffic to the next-hop towards its destination. There are no information owners.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None