UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must maintain reviewer/releaser identity and credentials within the established chain of custody for all information reviewed or released.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29121 SRG-OS-000210 SV-37115r1_rule Medium
Description
When it comes to data review and data release, there must be a correlation between the reviewed data and the person who performs the review. If the reviewer is a human or if the review function is automated but separate from the release/transfer function, the operating system associates the identity of the reviewer of the information to be released with the information and the information label.
STIG Date
Operating System Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None