UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Access control lists between the test and development environment and DoD operational networks must be in a deny-by-default posture.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39663 ENTD0240 SV-51530r1_rule ECSC-1 High
Description
To prevent malicious or accidental leakage of traffic between test and development environments and operational networks, organizations must implement a deny-by-default security posture. Perimeter routers, boundary controllers, or firewalls must deny incoming and outgoing traffic not expressly permitted. Such rule sets prevent many malicious exploits or accidental leakage by regulating the ports, protocols, or services necessary to the enclave.
STIG Date
Test and Development Zone A Security Technical Implementation Guide 2018-09-17

Details

Check Text ( C-46818r1_chk )
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environment and DoD operational networks. If the organization is not using a deny-by-default security posture for traffic between the test and development environment and DoD operational networks, this is a finding.
Fix Text (F-44671r1_fix)
Implement a deny-by-default security posture for both ingress and egress traffic between the test and development environment and DoD operational networks.