SV-224844r569186_rule
V-224844
SRG-OS-000425-GPOS-00189
WN16-00-000290
CAT II
10
Configure protection methods such as TLS, encrypted VPNs, or IPsec when the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
If the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, verify protection methods such as TLS, encrypted VPNs, or IPsec have been implemented.
If protection methods have not been implemented, this is a finding.
V-224844
False
WN16-00-000290
If the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, verify protection methods such as TLS, encrypted VPNs, or IPsec have been implemented.
If protection methods have not been implemented, this is a finding.
M
4205