UCF STIG Viewer Logo

Access control lists between the test and development environments must be in a deny-by-default posture.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39664 ENTD0250 SV-51531r1_rule ECSC-1 Medium
Description
To prevent malicious or accidental leakage of traffic, organizations must implement a deny-by-default security posture between test and development environments. All ingress and egress traffic not explicitly permitted between test and development environments must be denied. Such rule sets prevent many malicious exploits or accidental leakage by regulating the ports, protocols, or services necessary to each environment.
STIG Date
Test and Development Zone A Security Technical Implementation Guide 2015-12-17

Details

Check Text ( C-46819r1_chk )
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environments. If the organization is not using a deny-by-default security posture for traffic between the test and development environments, this is a finding.
Fix Text (F-44672r1_fix)
Implement a deny-by-default security posture for both ingress and egress traffic between test and development environments.