STIGhub
STIGs
RMF Controls
Compare
← SC-7 (17) — Boundary Protection
CCI-001125
Definition
Enforce adherence to protocol formats.
Parent Control
SC-7 (17)
Boundary Protection
System and Communications Protection
Linked STIG Checks (19)
V-76425
CAT II
Kona Site Defender that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
V-205048
CAT II
The ALG that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
Application Layer Gateway Security Requirements Guide
V-205049
CAT II
The ALG that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
Application Layer Gateway Security Requirements Guide
V-205050
CAT II
The ALG that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
Application Layer Gateway Security Requirements Guide
V-237418
CAT II
The CA API Gateway that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
CA API Gateway ALG Security Technical Implementation Guide
V-237419
CAT II
The CA API Gateway that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
CA API Gateway ALG Security Technical Implementation Guide
V-215801
CAT II
The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers.
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
V-215802
CAT II
The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic to virtual servers.
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
V-215803
CAT II
The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound HTTP and HTTPS traffic to virtual servers.
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
V-266147
CAT II
The F5 BIG-IP appliance that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-266148
CAT II
The F5 BIG-IP appliance that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-266149
CAT II
The F5 BIG-IP appliance that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-228879
CAT II
The Palo Alto Networks security platform must inspect inbound and outbound SMTP and Extended SMTP communications traffic (if authorized) for protocol compliance and protocol anomalies.
Palo Alto Networks ALG Security Technical Implementation Guide
V-228880
CAT II
The Palo Alto Networks security platform must inspect inbound and outbound FTP and FTPS communications traffic (if authorized) for protocol compliance and protocol anomalies.
Palo Alto Networks ALG Security Technical Implementation Guide
V-228881
CAT II
The Palo Alto Networks security platform must inspect inbound and outbound HTTP traffic (if authorized) for protocol compliance and protocol anomalies.
Palo Alto Networks ALG Security Technical Implementation Guide
V-94263
CAT II
The reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies.
Symantec ProxySG ALG Security Technical Implementation Guide
V-94265
CAT II
Symantec ProxySG providing intermediary services for FTP must inspect outbound FTP communications traffic for protocol compliance and protocol anomalies.
Symantec ProxySG ALG Security Technical Implementation Guide
V-94267
CAT II
Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies.
Symantec ProxySG ALG Security Technical Implementation Guide
V-94269
CAT II
Symantec ProxySG providing intermediary services for HTTP must inspect outbound HTTP traffic for protocol compliance and protocol anomalies.
Symantec ProxySG ALG Security Technical Implementation Guide