STIGQter STIGQter: STIG Summary: Network Device Management Security Requirements Guide Version: 4 Release: 1 Benchmark Date: 23 Apr 2021:

The network device must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

DISA Rule

SV-216508r401224_rule

Vulnerability Number

V-216508

Group Title

SRG-APP-000516

Rule Version

SRG-APP-000516-NDM-000317

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

Check Contents

Determine if the network device is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

If it is not configured in accordance with the designated security configuration settings, this is a finding.

Vulnerability Number

V-216508

Documentable

False

Rule Version

SRG-APP-000516-NDM-000317

Severity Override Guidance

Determine if the network device is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

If it is not configured in accordance with the designated security configuration settings, this is a finding.

Check Content Reference

M

Target Key

2890

Comments