UCF STIG Viewer Logo

The operating system must implement a configurable capability to automatically disable the operating system if any of the organization-defined lists of security violations are detected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28835 SRG-OS-000122 SV-36825r1_rule Medium
Description
When responding to a security incident a capability must exist allowing automated processes to disable a particular system if the system exhibits a security violation and the organization determines such an action is warranted. Organizations shall define a list of security violations warranting an immediate disabling of a system.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None