UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network access control solution (e.g., NAC appliance, policy server) will provide the capability to implement integrity checking to ensure the client agent itself has not been altered or otherwise compromised.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18842 SRC-NAC-140 SV-20595r1_rule ECSC-1 Medium
Description
Remote access devices are often lost or stolen. They represent a threat to the enclave if the agent is compromised as this is the data collection entity in the policy assessment solution. An integrity check allows for detection in case the agent is compromised.
STIG Date
Remote Access Policy STIG 2015-09-16

Details

Check Text ( C-22599r1_chk )
Check compliance by interviewing the site representative. Ask if the enforcement system has an integrity checking mechanism. Do not document details of the procedure used.
Fix Text (F-19517r1_fix)
Ensure that a method of integrity checking (e.g., a file or other check). Ensure that the installed endpoint agent .enforcement system has an integrity checking mechanism.