NET0379 - The FA will ensure that if the firewall product operates on an OS platform, the host must be STIG compliant prior to the install

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The FA will ensure that if the firewall product operates on an OS platform, the host must be STIG compliant prior to the installation of the firewall product.

If the host that a firewall engine is operating on is not secured, the firewall itself is exposed to greater risk.

NOTE: Nessus did not perform this check as this audit was specifically written for the Cisco ASA firewall appliance. Hence, the firewall software is likely not installed on an underlying host OS and is a software image created by Cisco Systems, Inc. Refer to the Cisco software documentation regarding software recommendations for your hardware platform to ensure the latest secure and stable version of the ASA software is installed. Further consultation with your applicable security policies and guidance may be required so the appropriate versions of software are installed.

Solution

The firewall administrator will install all patches that address IAVA.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Firewall_V8R24_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-4619r1_rule, STIG-ID|NET0379, Vuln-ID|V-4619

Plugin: Cisco

Control ID: 0711a49b34f0a48d542cf8ce79fca115256359a6bddd5474da756565351d42cc