STIGQter STIGQter: STIG Summary: Network Device Management Security Requirements Guide Version: 4 Release: 1 Benchmark Date: 23 Apr 2021:

The network device must enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.

DISA Rule

SV-202018r395568_rule

Vulnerability Number

V-202018

Group Title

SRG-APP-000038

Rule Version

SRG-APP-000038-NDM-000213

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.

Check Contents

Review the network device configuration to determine if it enforces approved authorizations for controlling the flow of management information within the network device based on information flow control policies. If it does not enforce these approved authorizations, this is a finding.

Vulnerability Number

V-202018

Documentable

False

Rule Version

SRG-APP-000038-NDM-000213

Severity Override Guidance

Review the network device configuration to determine if it enforces approved authorizations for controlling the flow of management information within the network device based on information flow control policies. If it does not enforce these approved authorizations, this is a finding.

Check Content Reference

M

Target Key

2890

Comments