UCF STIG Viewer Logo

Applications performing extrusion detection must be capable of denying network traffic and auditing internal users (or malicious code) posing a threat to external information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35692 SRG-APP-000259-MAPP-NA SV-46979r1_rule Medium
Description
Detecting internal actions that may pose a security threat to external information systems is sometimes termed extrusion detection. Extrusion detection at the information system boundary includes the analysis of network traffic (incoming as well as, outgoing) looking for indications of an internal threat to the security of external systems. Rationale for non-applicability: The requirement for application sandboxing precludes applications from providing extrusion detection for other applications. If an application were granted the ability to perform this function, the application could perform a man-in-the-middle attack on other applications running on the device.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-44035r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-40234r1_fix)
The requirement is NA. No fix is required.