For Enclaves and AIS applications, all DoD security configuration or implementation guides have been applied.
|MAC / CONF||Impact||Subject Area|
| MACI |
|High||Enclave Computing Environment|
|The computer hardware and software systems used within the DOD have varying amounts of risks. Security configuration or implementation guides are created to minimize the security risks associated with the hardware or software products.|
| 1. All IA and IA-enabled applications deployed within the enclave (C&A boundary) shall be configured or implemented according to the information within applicable security guides (e.g., STIGs, SNAC Guides). |
2. If security guides are not available for deployed IA products, waivers shall be obtained and commercial best practices shall be applied.