UCF STIG Viewer Logo

Access control lists between the test and development environment and DoD operational networks must be in a deny-by-default posture.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39663 ENTD0240 SV-51530r1_rule ECSC-1 High
Description
To prevent malicious or accidental leakage of traffic between test and development environments and operational networks, organizations must implement a deny-by-default security posture. Perimeter routers, boundary controllers, or firewalls must deny incoming and outgoing traffic not expressly permitted. Such rule sets prevent many malicious exploits or accidental leakage by regulating the ports, protocols, or services necessary to the enclave.
STIG Date
Test and Development Zone B Security Technical Implementation Guide 2015-12-17

Details

Check Text ( C-46818r1_chk )
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environment and DoD operational networks. If the organization is not using a deny-by-default security posture for traffic between the test and development environment and DoD operational networks, this is a finding.
Fix Text (F-44671r1_fix)
Implement a deny-by-default security posture for both ingress and egress traffic between the test and development environment and DoD operational networks.