STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AC-16 (1) — Security and Privacy Attributes

CCI-002272

Definition

Dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.

Parent Control

AC-16 (1)Security and Privacy AttributesAccess Control

Linked STIG Checks (6)

V-278965CAT IIThe application server must dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.Application Server Security Requirements GuideV-260043CAT IIThe Enterprise Voice, Video, and Messaging Session Manager must be configured to apply 802.1Q VLAN tags to signaling and media traffic.Enterprise Voice, Video, and Messaging Session Management Security Requirements GuideV-260044CAT IIThe Enterprise Voice, Video, and Messaging Session Manager must be configured to use a voice or video VLAN, separate from all other VLANs.Enterprise Voice, Video, and Messaging Session Management Security Requirements GuideV-278987CAT IIThe layer 2 switch must dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.Layer 2 Switch Security Requirements GuideV-279008CAT IIThe router must dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.Router Security Requirements GuideV-279025CAT IIThe VPN Gateway must dynamically associate security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.Virtual Private Network (VPN) Security Requirements Guide