Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-31210 | FN-01.02.01 | SV-41407r2_rule | ECAD-1 ECAN-1 IAAC-1 | Medium |
Description |
---|
Unauthorized access by foreign nationals to Information Systems can result in, among other things, security incidents, compromise of the system, or the introduction of a virus. |
STIG | Date |
---|---|
Traditional Security | 2013-07-11 |
Check Text ( C-39932r3_chk ) |
---|
When organizations grant foreign national access to U.S. DoD systems check to ensure foreign nationals granted e-mail privileges on DOD systems are clearly identified as such in their e-mail addresses IAW DoDD 8500.01E and CJCSI 6510.01F. TACTICAL ENVIRONMENT: This check is applicable where LN/FN are employed in a tactical environment with access to US or Coalition Forces Systems. |
Fix Text (F-35110r3_fix) |
---|
Foreign Nationals granted e-mail privileges on DOD systems must be clearly identified as such in their e-mail addresses IAW DoDD 8500.01E and CJCSI 6510.01F. |