Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23841 | WEBPL135 | SV-28787r1_rule | DCMC-1 | Low |
Description |
---|
Mobile code technologies represent a major threat vector with respect to the protection of DoD assets. Because this technology is continually evolving, guidance offered by DoD and NIST is also continually evolving. It is important to note with respect to threat mitigation that the hosting agency be aware of deployed mobile code. |
STIG | Date |
---|---|
Web Policy STIG | 2011-10-03 |
Check Text ( C-29276r1_chk ) |
---|
The intent of this check is to determine the awareness of deployed mobile code by the hosting agency, the SA, or the web administrator. The agency that owns the web application, which has been developed in accordance with the Application Security and Development STIG, will provide the hosting agency with information regarding the use of mobile code technology, including the type of mobile code used and any threat mitigations or configurations necessary for its deployment that require the SA’s or the web administrator’s involvement. Information regarding the use of mobile code deployment, including any responsibilities of the hosting agency, may be included with a MOU or the SLA. A list of deployed mobile code by server should be accessible in the event of threats against a specific technology. If the hosting agency does not deploy mobile code technology, the finding is Not Applicable. The SA or web administrator should only need to have access to information by server of deployed mobile code and, if necessary, any responsibilities they may have with regard to configurations, threat mitigations, etc., as indicated by the MOU or the SLA. If mobile code technology is deployed and the SA or the web administrator does not have access to deployment information, this is a finding. |
Fix Text (F-26303r1_fix) |
---|
Ensure the SA and the web administrator is aware of deployed mobile code. |