SV-222428r508029_rule
V-222428
SRG-APP-000039
APSC-DV-000490
CAT II
10
Configure the application to enforce data flow control in accordance with data flow control policies.
Review the application documentation and interview the application and system administrators.
Identify application features and functions to determine if the application is designed to control the flow of information between interconnected systems.
Identify:
- rulesets,
- data labels
- policies
- systems
to determine if the application is designed to control the flow of data between interconnected systems.
If the application does not provide data flow control capabilities, the requirement is not applicable.
Access the system as a user with access rights allowing the creation of test data or use of existing test data.
Create a test data set and label the data with a data label provided with or by the application (for example, a Personally Identifiable Information (PII) data label).
Review the policy settings to determine where the PII labeled data is allowed and is not allowed.
Using application features and functions, attempt to transmit the labeled data to an interconnected system that is prohibited by policy.
Verify the flow control policy was enforced and the data was not transmitted.
If the application does not enforce the approved authorizations for controlling data flow, this is a finding.
V-222428
False
APSC-DV-000490
Review the application documentation and interview the application and system administrators.
Identify application features and functions to determine if the application is designed to control the flow of information between interconnected systems.
Identify:
- rulesets,
- data labels
- policies
- systems
to determine if the application is designed to control the flow of data between interconnected systems.
If the application does not provide data flow control capabilities, the requirement is not applicable.
Access the system as a user with access rights allowing the creation of test data or use of existing test data.
Create a test data set and label the data with a data label provided with or by the application (for example, a Personally Identifiable Information (PII) data label).
Review the policy settings to determine where the PII labeled data is allowed and is not allowed.
Using application features and functions, attempt to transmit the labeled data to an interconnected system that is prohibited by policy.
Verify the flow control policy was enforced and the data was not transmitted.
If the application does not enforce the approved authorizations for controlling data flow, this is a finding.
M
4093