SV-205829r569188_rule
V-205829
SRG-OS-000425-GPOS-00189
WN19-00-000260
CAT II
10
Configure protection methods such as TLS, encrypted VPNs, or IPsec when the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
If the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, verify protection methods such as TLS, encrypted VPNs, or IPsec have been implemented.
If protection methods have not been implemented, this is a finding.
V-205829
False
WN19-00-000260
If the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, verify protection methods such as TLS, encrypted VPNs, or IPsec have been implemented.
If protection methods have not been implemented, this is a finding.
M
2907