Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-39665 | ENTD0260 | SV-51532r1_rule | ECIC-1 ECSC-1 | High |
Description |
---|
Using tunnels will prohibit data shared between interconnecting sites from leaking onto untrusted networks. These mechanisms are vital for transit over an untrusted network so sensitive information is not accidentally leaked onto the DISN or a non-DoD network. Typical tunnel mechanisms found in use today include, but are not limited to, IPSec, MPLS, GRE, and TACLANE. |
STIG | Date |
---|---|
Test and Development Zone C Security Technical Implementation Guide | 2015-12-17 |
Check Text ( C-46820r1_chk ) |
---|
Review the network diagrams to determine whether a tunnel is being used for transport across any untrusted network, such as the DISN or ISP. If a tunnel mechanism is not being used to carry information to other organizations over an untrusted network, this is a finding. |
Fix Text (F-44673r1_fix) |
---|
Engineer a solution to establish tunnel mechanisms interconnected between organizations over untrusted networks. |