UCF STIG Viewer Logo

The application must be capable of implementing host-based boundary protection mechanisms for servers, workstations, and mobile devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35655 SRG-APP-000250-MAPP-NA SV-46942r1_rule Medium
Description
A host-based boundary protection mechanism is a host-based firewall. Host-based boundary protection mechanisms are employed on mobile devices, such as notebook/laptop computers, and other types of mobile devices where such boundary protection mechanisms are available. Rationale for non-applicability: The requirement for application sandboxing precludes applications from serving as a security boundary for other applications. If an application were granted the ability to perform this function, the application could perform a man-in-the-middle attack on other applications running on the device.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-43997r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-40197r1_fix)
The requirement is NA. No fix is required.