STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-7 (17) — Boundary Protection

CCI-001125

Definition

Enforce adherence to protocol formats.

Parent Control

SC-7 (17)Boundary ProtectionSystem and Communications Protection

Linked STIG Checks (19)

V-76425CAT IIKona Site Defender that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-205048CAT IIThe ALG that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.Application Layer Gateway Security Requirements GuideV-205049CAT IIThe ALG that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.Application Layer Gateway Security Requirements GuideV-205050CAT IIThe ALG that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.Application Layer Gateway Security Requirements GuideV-237418CAT IIThe CA API Gateway that provides intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.CA API Gateway ALG Security Technical Implementation GuideV-237419CAT IIThe CA API Gateway that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.CA API Gateway ALG Security Technical Implementation GuideV-215801CAT IIThe BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215802CAT IIThe BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215803CAT IIThe BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound HTTP and HTTPS traffic to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-266147CAT IIThe F5 BIG-IP appliance that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-266148CAT IIThe F5 BIG-IP appliance that intermediary services for FTP must inspect inbound and outbound FTP communications traffic for protocol compliance and protocol anomalies.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-266149CAT IIThe F5 BIG-IP appliance that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-228879CAT IIThe Palo Alto Networks security platform must inspect inbound and outbound SMTP and Extended SMTP communications traffic (if authorized) for protocol compliance and protocol anomalies.Palo Alto Networks ALG Security Technical Implementation GuideV-228880CAT IIThe Palo Alto Networks security platform must inspect inbound and outbound FTP and FTPS communications traffic (if authorized) for protocol compliance and protocol anomalies.Palo Alto Networks ALG Security Technical Implementation GuideV-228881CAT IIThe Palo Alto Networks security platform must inspect inbound and outbound HTTP traffic (if authorized) for protocol compliance and protocol anomalies.Palo Alto Networks ALG Security Technical Implementation GuideV-94263CAT IIThe reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies.Symantec ProxySG ALG Security Technical Implementation GuideV-94265CAT IISymantec ProxySG providing intermediary services for FTP must inspect outbound FTP communications traffic for protocol compliance and protocol anomalies.Symantec ProxySG ALG Security Technical Implementation GuideV-94267CAT IISymantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies.Symantec ProxySG ALG Security Technical Implementation GuideV-94269CAT IISymantec ProxySG providing intermediary services for HTTP must inspect outbound HTTP traffic for protocol compliance and protocol anomalies.Symantec ProxySG ALG Security Technical Implementation Guide