STIGQter STIGQter: STIG Summary: Application Layer Gateway (ALG) Security Requirements Guide (SRG) Version: 1 Release: 2 Benchmark Date: 24 Jul 2015:

The ALG that is part of a CDS must use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.

DISA Rule

SV-68709r1_rule

Vulnerability Number

V-54463

Group Title

SRG-NET-000323-ALG-000067

Rule Version

SRG-NET-000323-ALG-000067

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If the ALG is part of a CDS, configure the ALG to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.

Check Contents

If the ALG is not part of a CDS, this is not applicable.

Verify the ALG uses source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.

If the ALG is not configured to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions, this is a finding.

Vulnerability Number

V-54463

Documentable

False

Rule Version

SRG-NET-000323-ALG-000067

Severity Override Guidance

If the ALG is not part of a CDS, this is not applicable.

Verify the ALG uses source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.

If the ALG is not configured to use source and destination security attributes associated with organization-defined information, source, and/or destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions, this is a finding.

Check Content Reference

M

Target Key

2489

Comments