The firewall must be configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-263648 | SRG-NET-000715 | SRG-NET-000715-FW-000120 | SV-263648r982549_rule | 2024-12-04 | 3 |
Description |
---|
Separating critical system components and functions from other noncritical system components and functions through separate subnetworks may be necessary to reduce susceptibility to a catastrophic or debilitating breach or compromise that results in system failure. For example, physically separating the command and control function from the in-flight entertainment function through separate subnetworks in a commercial aircraft provides an increased level of assurance in the trustworthiness of critical system functions. |
ℹ️ Check |
---|
Verify the firewall is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the firewall is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding. |
✔️ Fix |
---|
Configure the firewall to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. |