UCF STIG Viewer Logo

All encrypted traffic must be decrypted prior to passing through content inspection and filtering mechanisms.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26765 SRG-NET-000030 SV-34013r1_rule Medium
Description
Allowing traffic to bypass the security checkpoints such as firewalls and intrusion detection systems puts the network infrastructure and critical data at risk. Malicious traffic could enter the network undetected and attack a key network element or the server farm. Hence, it is imperative all encrypted traffic entering the network is decrypted prior to the content checking devices.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None