UCF STIG Viewer Logo

The network element must prevent access to organizationally defined security-relevant information except during secure, non-operable system states.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000279-RTR-NA SRG-NET-000279-RTR-NA SRG-NET-000279-RTR-NA_rule Medium
Description
Security-relevant information is any information within the information system that can potentially impact the operation of security functions in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data. Organizations may define specific security-relevant information that requires protection. Filtering rules for routers and firewalls, cryptographic key management information, key configuration parameters for security services, and access control lists are examples of security-relevant information. Secure, non-operable system states are states in which the network element is not performing mission or business-related processing (e.g., the system is offline for maintenance, troubleshooting, boot-up, shutdown). Access to these types of data is to be prevented unless the system is in a maintenance mode or has otherwise been brought offline. The goal is to minimize the potential that a security configuration or data may be dynamically and perhaps maliciously overwritten or changed without going through a formal system change process that can document the changes. This requirement is applicable to network device management and is not applicable to the routing function.
STIG Date
Router Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000279-RTR-NA_chk )
This requirement is NA for router.
Fix Text (F-SRG-NET-000279-RTR-NA_fix)
This requirement is NA for router.