Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
RHEL-06-000451-PNF | RHEL-06-000451-PNF | RHEL-06-000451-PNF_rule | Medium |
Description |
---|
Information can be subjected to unauthorized changes (e.g., malicious and/or unintentional modification) at information aggregation or protocol transformation points. It is therefore imperative the operating system take steps to validate and assure the integrity of data while at these stages of processing. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 6 Security Technical Implementation Guide | 2013-02-05 |
Check Text ( C-RHEL-06-000451-PNF_chk ) |
---|
RHEL6 supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding. |
Fix Text (F-RHEL-06-000451-PNF_fix) |
---|
This requirement is a permanent not a finding. No fix is required. |