UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

During security policy assessment, a procedure will exist that when critical security issues are found that put the network at risk, the remote endpoint will be placed immediately on the “blacklist” and the connection will be terminated.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18834 SRC-NAC-070 SV-20587r1_rule ECSC-1 Low
Description
Automated and manual procedures for remediation for critical security updates will be managed differently. Continuing to assess and remediate endpoints with risks that could endanger the network could impact network usage for all users.
STIG Date
Remote Access Policy STIG 2015-09-16

Details

Check Text ( C-22569r1_chk )
Verify existence of a procedure for blacklisting and terminating when critical security issues are found during a security policy assessment.
Fix Text (F-19506r1_fix)
Ensure during security policy assessment, a procedure exists such that when critical security issues are found that put the network at risk, the remote endpoint will be placed immediatly on the “blacklist” and the connection will be terminated.