UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Development systems must have a firewall installed, configured, and enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39439 ENTD0090 SV-51297r1_rule ECSC-1 Medium
Description
A firewall provides a line of defense against malicious attacks. To be effective, it must be enabled and properly configured.
STIG Date
Test and Development Zone C Security Technical Implementation Guide 2018-09-17

Details

Check Text ( C-46714r3_chk )
Review the development images to determine whether the OS or a third party firewall has been installed, configured, and enabled. If a firewall is not installed, configured, and enabled, this is a finding.

If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix Text (F-44452r2_fix)
Install, configure, and enable either the OS or a third party firewall on the development system.