Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27506 | SRG-NET-000271 | SV-34815r1_rule | Medium |
Description |
---|
Anomalous behavior and unauthorized changes must be detected before the network element is breeched or no longer in service. Identifying the source and method used to make the unauthorized change will help to determine what data is at risk and if other systems may be affected. |
STIG | Date |
---|---|
Network Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |