DoD STIGs – V-32557

Overview:

Title: Applications designed to enforce protocol formats must employ automated mechanisms to enforce strict adherence to protocol format.

Vulnerability ID: V-32557

STIG ID:

IA Controls: None

Severity: medium

Description: Automated mechanisms used to enforce protocol formats include deep packet inspection firewalls and XML gateways. These devices verify adherence to the protocol specification (e.g., IEEE) at the application layer and serve to identify significant vulnerabilities that cannot be detected by devices operating at the network or transport layer. It is impractical to expect protocol format inspection to be conducted manually.

This requirement applies to applications designed to enforce protocol formats and is NA for databases.

Check Text: This check is NA for databases.

Fix Text: This fix is NA for databases.

[divider]

Interpreting V-32557:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.