UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must automate mechanisms to restrict the use of maintenance tools to authorized personnel only.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27353 SRG-NET-000172 SV-34658r1_rule Medium
Description
With the growth of widespread network-delivered malware infections, organizations tend to overlook the spread of malware from system to system through removable media. Once an infected media is connected to the information system, any worms on it will spread through the system. Maintenance tools connecting to a network element for diagnostics could be carrying malware; therefore, their use must be restricted to authorized personnel.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None