UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Tunneling mechanisms must be used for data transmission between interconnected organizations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39665 ENTD0260 SV-51532r1_rule ECIC-1 ECSC-1 High
Description
Using tunnels will prohibit data shared between interconnecting sites from leaking onto untrusted networks. These mechanisms are vital for transit over an untrusted network so sensitive information is not accidentally leaked onto the DISN or a non-DoD network. Typical tunnel mechanisms found in use today include, but are not limited to, IPSec, MPLS, GRE, and TACLANE.
STIG Date
Test and Development Zone C Security Technical Implementation Guide 2015-12-17

Details

Check Text ( C-46820r1_chk )
Review the network diagrams to determine whether a tunnel is being used for transport across any untrusted network, such as the DISN or ISP. If a tunnel mechanism is not being used to carry information to other organizations over an untrusted network, this is a finding.
Fix Text (F-44673r1_fix)
Engineer a solution to establish tunnel mechanisms interconnected between organizations over untrusted networks.