UCF STIG Viewer Logo

The operating system must limit privileges to change software resident within software libraries (including privileged programs).


Overview

Finding ID Version Rule ID IA Controls Severity
V-28974 SRG-OS-000259 SV-36965r1_rule Medium
Description
When dealing with change control issues, it should be noted that any changes to the hardware, software, and/or firmware components of the operating system can potentially have significant effects on the overall security of the system. Only qualified and authorized individuals must be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None