SV-80361r1_rule
V-65871
SRG-APP-000039
TMDS-00-000045
CAT II
10
Configure the Trend Deep Security server to enforce approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies.
Use the Computer and Group Rights panel to confer viewing, editing, deleting, Alert-dismissal, and Event tagging rights to Users in a Role. These rights can apply to all computers and computer groups or they can be restricted to only certain computers.
To restrict access, select the "Selected Computers" radio button and put a check next to the computer groups and computers that Users in this Role will have access to.
Administration >> User Management >> Roles
Select a Role and click Properties >> Computer Rights
Review the Trend Deep Security server to ensure approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies are enforced.
Interview the ISSO in order to identify all users with permissions to the application. The ISSO must identify each user along with their assigned role configured for the appropriate information systems allowed.
Verify the information gathered against the application's, "Computer and Group Rights" for each "Role" created along with the users assigned.
If the information gathered does not match the settings within the application this is a finding.
V-65871
False
TMDS-00-000045
Review the Trend Deep Security server to ensure approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies are enforced.
Interview the ISSO in order to identify all users with permissions to the application. The ISSO must identify each user along with their assigned role configured for the appropriate information systems allowed.
Verify the information gathered against the application's, "Computer and Group Rights" for each "Role" created along with the users assigned.
If the information gathered does not match the settings within the application this is a finding.
M
2955