Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-29020 | SRG-OS-000186 | SV-37011r1_rule | Medium |
Description |
---|
Information can be subjected to unauthorized changes (e.g., malicious and/or unintentional modification) at information aggregation or protocol transformation points. It is therefore imperative the operating system take steps to validate and assure the integrity of data while at these stages of processing. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2011-12-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |