STIGQter STIGQter: STIG Summary: Application Layer Gateway (ALG) Security Requirements Guide (SRG) Version: 1 Release: 2 Benchmark Date: 24 Jul 2015:

The ALG providing content filtering must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

DISA Rule

SV-68901r1_rule

Vulnerability Number

V-54655

Group Title

SRG-NET-000246-ALG-000132

Rule Version

SRG-NET-000246-ALG-000132

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

Check Contents

If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable.

Verify the ALG updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

If the ALG does not update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.

Vulnerability Number

V-54655

Documentable

False

Rule Version

SRG-NET-000246-ALG-000132

Severity Override Guidance

If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable.

Verify the ALG updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

If the ALG does not update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.

Check Content Reference

M

Target Key

2489

Comments