UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Automated Information System (AIS) will be physically secured in an access controlled area.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1070 1.001 SV-32240r1_rule PECF-1 Medium
Description
Inadequate physical protection can undermine all other security precautions utilized to protect the system. This can jeopardize the confidentiality, availability, and integrity of the system. Physical security of the AIS is the first line protection of any system.
STIG Date
Windows Server 2008 R2 Member Server Security Technical Implementation Guide 2013-10-01

Details

Check Text ( C-32862r1_chk )
Interview the SA to determine if equipment is located in an access controlled area.

Servers will be located in rooms, or locked cabinets, that are accessible only to authorized systems personnel. Authorized user access should be verified at two points (i.e. building access and server room).
Fix Text (F-31r1_fix)
Relocate equipment to a controlled access area.