UCF STIG Viewer Logo

The operating system must route all networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28896 SRG-OS-000153 SV-36887r1_rule Medium
Description
Managed interfaces employing boundary protection must be used for operating systems when using privileged accesses.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None