SV-222667r508029_rule
V-222667
SRG-APP-000516
APSC-DV-003320
CAT II
10
Implement mitigations from the threat model for DOS attacks.
Ask the application representative for the threat model document.
Examine the threat model document and determine if DoS attacks are specified as a threat.
If there are no DoS threats identified in the threat model, the requirement is not applicable.
Verify the mitigations provided for DoS attacks are implemented from the threat model.
If mitigations for DoS attacks are identified in the threat model but are not implemented, this is a finding.
V-222667
False
APSC-DV-003320
Ask the application representative for the threat model document.
Examine the threat model document and determine if DoS attacks are specified as a threat.
If there are no DoS threats identified in the threat model, the requirement is not applicable.
Verify the mitigations provided for DoS attacks are implemented from the threat model.
If mitigations for DoS attacks are identified in the threat model but are not implemented, this is a finding.
M
4093