UCF STIG Viewer Logo

The network element must protect against unauthorized physical connections across the boundary protections implemented at organization-defined list of managed interfaces.


Overview

Finding ID Version Rule ID IA Controls Severity
V-30598 SRG-NET-000309 SV-40350r1_rule Medium
Description
Local access to the network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Eliminating unauthorized access to the network is vital to maintaining a secured network.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None