Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-39663 | ENTD0240 | SV-51530r1_rule | ECSC-1 | High |
Description |
---|
To prevent malicious or accidental leakage of traffic between test and development environments and operational networks, organizations must implement a deny-by-default security posture. Perimeter routers, boundary controllers, or firewalls must deny incoming and outgoing traffic not expressly permitted. Such rule sets prevent many malicious exploits or accidental leakage by regulating the ports, protocols, or services necessary to the enclave. |
STIG | Date |
---|---|
Test and Development Zone A Security Technical Implementation Guide | 2018-09-17 |
Check Text ( C-46818r1_chk ) |
---|
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environment and DoD operational networks. If the organization is not using a deny-by-default security posture for traffic between the test and development environment and DoD operational networks, this is a finding. |
Fix Text (F-44671r1_fix) |
---|
Implement a deny-by-default security posture for both ingress and egress traffic between the test and development environment and DoD operational networks. |