STIGQter STIGQter: STIG Summary: Router Security Requirements Guide Version: 4 Release: 2 Benchmark Date: 23 Apr 2021:

The perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.

DISA Rule

SV-207108r604135_rule

Vulnerability Number

V-207108

Group Title

SRG-NET-000019

Rule Version

SRG-NET-000019-RTR-000002

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.

Check Contents

Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.

If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.

Vulnerability Number

V-207108

Documentable

False

Rule Version

SRG-NET-000019-RTR-000002

Severity Override Guidance

Verify each router enforces approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.

If the router does not enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy, this is a finding.

Check Content Reference

M

Target Key

2917

Comments