STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must protect the confidentiality and integrity of stored information when required by DoD policy or the information owner.

DISA Rule

SV-222587r508029_rule

Vulnerability Number

V-222587

Group Title

SRG-APP-000231

Rule Version

APSC-DV-002330

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Identify data elements that require protection. Document the data types and specify protection requirements and methods used.

Check Contents

Review the application documentation and interview the application administrator.

Identify the data processed by the application and the accompanying data protection requirements.

Determine if the data owner has specified stored data protection requirements.

Determine if the application is processing publicly releasable, FOUO or classified stored data.

Determine if the application configuration information contains sensitive information.

Access the data repository and have the application administrator, application developer or designer identify the data integrity and confidentiality protections utilized to protect stored data.

If the application processes classified data or if the data owner has specified data protection requirements and the application administrator is unable to demonstrate how the data is protected, this is a finding.

Vulnerability Number

V-222587

Documentable

False

Rule Version

APSC-DV-002330

Severity Override Guidance

Review the application documentation and interview the application administrator.

Identify the data processed by the application and the accompanying data protection requirements.

Determine if the data owner has specified stored data protection requirements.

Determine if the application is processing publicly releasable, FOUO or classified stored data.

Determine if the application configuration information contains sensitive information.

Access the data repository and have the application administrator, application developer or designer identify the data integrity and confidentiality protections utilized to protect stored data.

If the application processes classified data or if the data owner has specified data protection requirements and the application administrator is unable to demonstrate how the data is protected, this is a finding.

Check Content Reference

M

Target Key

4093

Comments