DoD STIGs – V-32559

Overview:

Title: Boundary protection applications must be capable of preventing public access into the organizations internal networks except as appropriately mediated by managed interfaces.

Vulnerability ID: V-32559

STIG ID:

IA Controls: None

Severity: medium

Description: Access into an organization’s internal network and to key internal boundaries must be tightly controlled and managed. Applications monitoring and/or controlling communications at the external boundary of the system and at key internal boundaries must be capable of preventing public access into the organization’s internal networks except as appropriately mediated by managed interfaces.

This requirement is specific to boundary protection devices. This requirement is NA for databases.

Check Text: This check is NA for databases.

Fix Text: This fix is NA for databases.

[divider]

Interpreting V-32559:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.