Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-29014 | SRG-OS-000272 | SV-37005r1_rule | Medium |
Description |
---|
The need to verify security functionality applies to all security functions. For those security functions unable to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include startup, restart, shutdown, and abort. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2013-03-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |