Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-28898 | SRG-OS-000154 | SV-36889r1_rule | Medium |
Description |
---|
Allowing discovery of operating system resources, names, or components can lead to giving information to an attacker that may be used as an attack vector. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2013-03-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |