UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SANs are not compliant with overall network security architecture, appropriate enclave, and data center security requirements in the Network Infrastructure STIG and the Enclave STIG


Overview

Finding ID Version Rule ID IA Controls Severity
V-6610 SAN04.002.00 SV-6730r1_rule Medium
Description
Inconsistencies with the Network Infrastructure STIG, the Enclave STIG, and the SAN implementation can lead to the creation of vulnerabilities in the network or the enclave.
STIG Date
Storage Area Network STIG 2018-10-03

Details

Check Text ( C-2444r1_chk )
The reviewer will interview the IAO/NSO to validate that SANs are compliant with overall network security architecture, appropriate enclave, and data center security requirements in the Network Infrastructure STIG and the Enclave STIG.

NOTE: The intent of this check is to ensure that the other checklists were applied. If they are applied then, regardless of what the findings are, this is not a finding. The objective of this policy is met if the other checklists were applied and documented.
Fix Text (F-6199r1_fix)
Perform a self assessment with the Network Infrastructure checklist and the Enclave checklist or schedule a formal review with FSO.