UCF STIG Viewer Logo

The operating system must check incoming communications to ensure the communications are coming from an authorized source and routed to an authorized destination.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28890 SRG-OS-000151 SV-36881r1_rule Medium
Description
In the case of the operating system, the boundary may be the workstation on the public internet. In order to thwart an attack the operating system must be able to ensure communications are coming from an authorized source and routed to an authorized destination.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None