UCF STIG Viewer Logo

The Automated Information System (AIS) will be physically secured in an access controlled area.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1070 1.001 SV-32240r1_rule Medium
Description
Inadequate physical protection can undermine all other security precautions utilized to protect the system. This can jeopardize the confidentiality, availability, and integrity of the system. Physical security of the AIS is the first line protection of any system.
STIG Date
Windows Server 2008 R2 Member Server Security Technical Implementation Guide 2019-06-18

Details

Check Text ( C-32862r1_chk )
Interview the SA to determine if equipment is located in an access controlled area.

Servers will be located in rooms, or locked cabinets, that are accessible only to authorized systems personnel. Authorized user access should be verified at two points (i.e. building access and server room).
Fix Text (F-31r1_fix)
Relocate equipment to a controlled access area.