STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-7 (9) — Boundary Protection

CCI-001115

Definition

The information system, at managed interfaces, denies network traffic and audits internal users (or malicious code) posing a threat to external information systems.

Parent Control

SC-7 (9)Boundary ProtectionSystem and Communications Protection

Linked STIG Checks (2)

V-281360CAT IIRHEL 10 must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-281362CAT IIRHEL 10 must configure a DNS processing mode in Network Manager to avoid conflicts with other Domain Name Server (DNS) managers and to not leak DNS queries to untrusted networks.Red Hat Enterprise Linux 10 Security Technical Implementation Guide