UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Systems must be physically secured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1070 WN08-00-000001 SV-48014r1_rule PECF-1 Medium
Description
Inadequate physical protection can undermine all other security precautions utilized to protect the system. This can jeopardize the confidentiality, availability, and integrity of the system. Physical security is the first line of protection of any system.
STIG Date
Windows 8 / 8.1 Security Technical Implementation Guide 2014-06-27

Details

Check Text ( C-44752r1_chk )
Verify user workstations containing sensitive data are in access-controlled areas. Users must maintain control of, and protect, mobile systems. If systems are not adequately protected, this is a finding.
Fix Text (F-41152r1_fix)
Establish site policy that ensures workstations containing sensitive data are located inside a controlled access area. Establish a policy on protecting mobile systems outside of controlled areas.