The firewall must be configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-263648 | SRG-NET-000715-FW-000120 | SV-263648r982549_rule | CCI-004891 | medium |
| Description | ||||
| Separating critical system components and functions from other noncritical system components and functions through separate subnetworks may be necessary to reduce susceptibility to a catastrophic or debilitating breach or compromise that results in system failure. For example, physically separating the command and control function from the in-flight entertainment function through separate subnetworks in a commercial aircraft provides an increased level of assurance in the trustworthiness of critical system functions. | ||||
| STIG | Date | |||
| Firewall Security Requirements Guide | 2024-12-04 | |||
Details
Check Text (C-263648r982549_chk)
Verify the firewall is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
If the firewall is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix Text (F-67456r982106_fix)
Configure the firewall to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.