The layer 2 switch must uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-278984SRG-NET-000326-L2S-000042SV-278984r1137777_ruleCCI-002207medium
Description
Attribution is a critical component of a security concept of operations. The ability to identify source and destination points for information flowing in information systems, allows the forensic reconstruction of events when required, and encourages policy compliance by attributing policy violations to specific organizations/individuals. Successful domain authentication requires that information system labels distinguish among systems, organizations, and individuals involved in preparing, sending, receiving, or disseminating information. This requirement applies to layer 2 switches that transfer information between different security domains (e.g., cross-domain solutions). This requirement also applies to Zero Trust initiatives.
STIGDate
Layer 2 Switch Security Requirements Guide2026-02-12

Details

Check Text (C-278984r1137777_chk)

Verify the layer 2 switch is configured to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer. If the layer 2 switch does not uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer, this is a finding.

Fix Text (F-83437r1137776_fix)

Configure the layer 2 switch to uniquely identify and authenticate destination by organization, system, application, and/or individual for information transfer.