UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must establish a trusted communications path between the user and organization-defined security functions within the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27445 SRG-NET-000214 SV-34754r1_rule Medium
Description
To safeguard critical information that could be used by a malicious user to compromise the device or the entire network infrastructure, a trusted path is required for high-confidence connections between the security functions (i.e., login) of the network element and the user.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None