From Enclave - Zone B Checklist
Part of Non-production guests communicate with DoD.
Associated with IA controls: ECSC-1
Virtual Machine clients provide a means for remote access into a separate enclave infrastructure using the same hardware the production client/OS resides on. As T&D environments are not always secure, this poses additional risk to the DoD desktop client or device if that device is utilizing such an architecture for remote access.
Work with the network reviewer to determine if the is a VPN solution in place for virtual machine remote access solutions into a T&D environment. An OS reviewer may have to review the system to determine if the "guest" is configured to only communicate with zone perimeter devices via a tunnel (VPN) rather than using the LAN as a transport mechanism.
The IAO will ensure non-production virtual machine “guests” only communicate with the zone perimeter access devices via a tunnel (VPN). There is no DoD network connectivity via the LAN.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer