UCF STIG Viewer Logo

The system must use an access control program.


Overview

Finding ID Version Rule ID IA Controls Severity
V-940 GEN006580 SV-37756r1_rule EBRU-1 Medium
Description
Access control programs (such as TCP_WRAPPERS) provide the ability to enhance system security posture.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-32218r1_fix)
Install and configure the tcp_wrappers package.