STIGQter STIGQter: STIG Summary: Application Layer Gateway (ALG) Security Requirements Guide (SRG) Version: 1 Release: 2 Benchmark Date: 24 Jul 2015:

The ALG that is part of a CDS must decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.

DISA Rule

SV-68717r1_rule

Vulnerability Number

V-54471

Group Title

SRG-NET-000282-ALG-000071

Rule Version

SRG-NET-000282-ALG-000071

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If the ALG is part of a CDS, configure the ALG to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.

Check Contents

If the ALG is not part of a CDS, this is not applicable.

Verify the ALG, when transferring information between different security domains, is configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.

If the ALG is not configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains, this is a finding.

Vulnerability Number

V-54471

Documentable

False

Rule Version

SRG-NET-000282-ALG-000071

Severity Override Guidance

If the ALG is not part of a CDS, this is not applicable.

Verify the ALG, when transferring information between different security domains, is configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains.

If the ALG is not configured to decompose information into organization-defined, policy-relevant subcomponents for submission to policy enforcement mechanisms before transferring information between different security domains, this is a finding.

Check Content Reference

M

Target Key

2489

Comments