UCF STIG Viewer Logo

The SANs are not compliant with overall network security architecture, appropriate enclave, and data center security requirements in the Network Infrastructure STIG and the Enclave STIG


Overview

Finding ID Version Rule ID IA Controls Severity
V-6610 SAN04.002.00 SV-6730r1_rule Medium
Description
Inconsistencies with the Network Infrastructure STIG, the Enclave STIG, and the SAN implementation can lead to the creation of vulnerabilities in the network or the enclave.
STIG Date
Storage Area Network STIG 2019-06-28

Details

Check Text ( C-2444r1_chk )
The reviewer will interview the IAO/NSO to validate that SANs are compliant with overall network security architecture, appropriate enclave, and data center security requirements in the Network Infrastructure STIG and the Enclave STIG.

NOTE: The intent of this check is to ensure that the other checklists were applied. If they are applied then, regardless of what the findings are, this is not a finding. The objective of this policy is met if the other checklists were applied and documented.
Fix Text (F-6199r1_fix)
Perform a self assessment with the Network Infrastructure checklist and the Enclave checklist or schedule a formal review with FSO.