UCF STIG Viewer Logo

The operating system must enforce a two-person rule for changes to organization-defined information system components and system-level information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28793 SRG-OS-000091 SV-36783r1_rule Medium
Description
Regarding access restrictions for changes made to organization-defined information system components and system level information. Any changes to the hardware, software, and/or firmware components of the operating system can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals are allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications. A two person rule requires two separate individuals acknowledge and approve those changes. Two person rule for changes to critical operating system components helps to reduce risks pertaining to availability and integrity.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None