Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-18842 | SRC-NAC-140 | SV-20595r1_rule | ECSC-1 | Medium |
Description |
---|
Remote access devices are often lost or stolen. They represent a threat to the enclave if the agent is compromised as this is the data collection entity in the policy assessment solution. An integrity check allows for detection in case the agent is compromised. |
STIG | Date |
---|---|
Remote Access Policy STIG | 2015-09-16 |
Check Text ( C-22599r1_chk ) |
---|
Check compliance by interviewing the site representative. Ask if the enforcement system has an integrity checking mechanism. Do not document details of the procedure used. |
Fix Text (F-19517r1_fix) |
---|
Ensure that a method of integrity checking (e.g., a file or other check). Ensure that the installed endpoint agent .enforcement system has an integrity checking mechanism. |