Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-28890 | SRG-OS-000151 | SV-36881r1_rule | Medium |
Description |
---|
In the case of the operating system, the boundary may be the workstation on the public internet. In order to thwart an attack the operating system must be able to ensure communications are coming from an authorized source and routed to an authorized destination. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2013-03-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |