UCF STIG Viewer Logo

The operating system must employ automated mechanisms to facilitate the monitoring and control of remote access methods.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29089 SRG-OS-000032 SV-37081r1_rule Medium
Description
Remote network access is accomplished by leveraging common communication protocols and establishing a remote connection. Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. Automated monitoring of remote access sessions allows organizations to audit user activities on a variety of information system components (e.g., servers, workstations, notebook/laptop computers) and to ensure compliance with remote access policy.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None