UCF STIG Viewer Logo

The application must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35297 SRG-APP-000106-MAPP-NA SV-46584r1_rule Medium
Description
It is critical when a system is at risk of failing to process audit logs as required; actions are automatically taken to mitigate the failure or risk of failure. One method used to thwart the auditing system is for an attacker to attempt to overwhelm the auditing system with large amounts of irrelevant data. The end result being audit logs that are either overwritten and activity thereby erased or disk space that is exhausted and any future activity is no longer logged. In many system configurations, the disk space allocated to the auditing system is separate from the disks allocated for the operating system; therefore, this may not result in a system outage. Rationale for non-applicability: Management of network traffic volume is best addressed by the mobile device carrier or enterprise network infrastructure, or by the operating system. Even if a mobile application fully utilizes the available network throughput on a mobile device, this will not have an appreciable impact on other users. Mobile device operating systems have mechanisms to throttle data throughput for background processes. Artificially restricting the throughput of the foreground application could cause a performance issue or even a DoS.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-43666r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-39843r1_fix)
The requirement is NA. No fix is required.