UCF STIG Viewer Logo

The operating system must enforce logical access restrictions associated with changes to the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28786 SRG-OS-000087 SV-36776r1_rule Medium
Description
When dealing with access restrictions pertaining to change control, it should be noted that any changes to the hardware, software, and/or firmware components of the information system can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals should be allowed to obtain access to operating system for the purpose of initiating changes, including upgrades and modifications.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None