Overview:
Title: Applications that are utilized to address the issue of SPAM and provide protection from SPAM must automatically update any and all SPAM protection measures including signature definitions.
Vulnerability ID: V-32565
STIG ID:
IA Controls: None
Severity: medium
Description: Originators of SPAM emails are constantly changing their source email addresses in order to defeat SPAM countermeasures; therefore, SPAM software must be constantly updated to address the changing threat. A manual update procedure is labor intensive and does not scale well in an enterprise environment which necessitates an automatic update capability.
This requirement is specific to applications that serve to protect organizations and individuals from SPAM messages. This requirement is NA for databases.
Check Text: This check is NA for databases.
Fix Text: This fix is NA for databases.
[divider]Interpreting V-32565:
Coming Soon!
Return to the DoD STIGs – Database Security Requirements Guide