UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must implement host-based boundary protection mechanisms for servers, workstations, and mobile devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28892 SRG-OS-000152 SV-36883r1_rule Medium
Description
A host-based boundary protection mechanism is a host-based firewall. Host-based boundary protection mechanisms are employed on mobile devices, such as notebook/laptop computers and other types of mobile devices. For the operating system, this requirement ensures the operating system either can natively support this requirement or has an application installed to support this requirement.
STIG Date
Operating System Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None