Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-48159 | SOL-11.1-060130 | SV-61031r1_rule | Medium |
Description |
---|
Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. Using cryptography ensures confidentiality of the remote access connections. |
STIG | Date |
---|---|
Solaris 11 SPARC Security Technical Implementation Guide | 2015-12-07 |
Check Text ( C-50591r1_chk ) |
---|
All remote sessions must be conducted via encrypted services and ports. Ask the operator to document all configured external ports and protocols. If any unencrypted connections are used, this is a finding. |
Fix Text (F-51767r2_fix) |
---|
All remote sessions must be conducted via SSH and IPsec. Ensure that SSH and IPsec are the only protocols used. |