UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must check incoming communications to ensure the communications are coming from an authorized source and routed to an authorized destination.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28890 SRG-OS-000151 SV-36881r1_rule Medium
Description
In the case of the operating system, the boundary may be the workstation on the public internet. In order to thwart an attack the operating system must be able to ensure communications are coming from an authorized source and routed to an authorized destination.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None