UCF STIG Viewer Logo

The information system must fail securely in the event of an operational failure of a boundary protection device.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27360 SRG-NET-NA SV-34666r1_rule Medium
Description
Network elements cannot be taken down as a result of any upstream security violations or failures. If a network at the edge shuts down -- traffic will not enter nor exit.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None