The site will establish a configuration baseline and policy regarding the use and configuration of personal firewalls for remote access clients.

From Remote Endpoint STIG

Part of SRC-EPT-406 Firewall policy and baseline

Associated with IA controls: ECSC-1

SV-6801r1_rule The site will establish a configuration baseline and policy regarding the use and configuration of personal firewalls for remote access clients.

Vulnerability discussion

A firewall configuration baseline will allow the IAO to have a mechanism to check the compliance of a firewall with the site policy. These configurations can sometimes be updated by users and should be compared to a baseline.

Check content

Review a copy of the site’s baseline procedures or written policy regarding configuration of remote access devices. Note that this check does not include validation of the contents, which is verified in another requirement. If a personal firewall baseline configuration document does not exist, this is a finding.

Fix text

Develop a software baseline for the personal firewall configuration.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer