GEN005580 - A system used for routing must not run other network services or applications.

Information

Installing extraneous software on a system designated as a dedicated router poses a security threat to the system and the network. Should an attacker gain access to the router through the unauthorized software, the entire network is susceptible to malicious activity.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Ensure only authorized software is loaded on a designated router. Authorized software will be limited to the most current version of routing protocols and SSH for system administration purposes.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-4, 800-53|SC-5, CAT|II, CCI|CCI-000366, Rule-ID|SV-227911r505926_rule, STIG-ID|GEN005580, STIG-Legacy|SV-4398, STIG-Legacy|V-4398, Vuln-ID|V-227911

Plugin: Unix

Control ID: 0f0ed37dec0198b7163bb5124bc62dc070ac2f51a95507d0e0c3c19bb1c70b62