Check: ENTD0240
Test and Development Zone A STIG:
ENTD0240
(in versions v1 r6 through v1 r3)
Title
Access control lists between the test and development environment and DoD operational networks must be in a deny-by-default posture. (Cat I impact)
Discussion
To prevent malicious or accidental leakage of traffic between test and development environments and operational networks, organizations must implement a deny-by-default security posture. Perimeter routers, boundary controllers, or firewalls must deny incoming and outgoing traffic not expressly permitted. Such rule sets prevent many malicious exploits or accidental leakage by regulating the ports, protocols, or services necessary to the enclave.
Check Content
Determine whether a deny-by-default security posture has been implemented for both ingress and egress traffic between the test and development environment and DoD operational networks. If the organization is not using a deny-by-default security posture for traffic between the test and development environment and DoD operational networks, this is a finding.
Fix Text
Implement a deny-by-default security posture for both ingress and egress traffic between the test and development environment and DoD operational networks.
Additional Identifiers
Rule ID: SV-51530r1_rule
Vulnerability ID: V-39663
Group Title: ENTD0240 - Access control lists not in deny-by-default security posture.
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |