The VPN Gateway must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-264329SRG-NET-000715-VPN-000120SV-264329r984316_ruleCCI-004891medium
Description
Separating critical system components and functions from other noncritical system components and functions through separate subnetworks may be necessary to reduce susceptibility to a catastrophic or debilitating breach or compromise that results in system failure. For example, physically separating the command and control function from the in-flight entertainment function through separate subnetworks in a commercial aircraft provides an increased level of assurance in the trustworthiness of critical system functions.
STIGDate
Virtual Private Network (VPN) Security Requirements Guide2024-12-19

Details

Check Text (C-264329r984316_chk)

Verify the VPN Gateway is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the VPN Gateway is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.

Fix Text (F-68150r984315_fix)

Configure the VPN Gateway to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.