STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-7 (9) — Boundary Protection

CCI-002400

Definition

Audit the identity of internal users associated with denied outgoing communications traffic posing a threat to external systems.

Parent Control

SC-7 (9)Boundary ProtectionSystem and Communications Protection

Linked STIG Checks (5)

V-205010CAT IIThe ALG must identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems.Application Layer Gateway Security Requirements GuideV-266146CAT IIThe F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-228863CAT IIThe Palo Alto Networks security platform must identify and log internal users associated with prohibited outgoing communications traffic.Palo Alto Networks ALG Security Technical Implementation GuideV-279167CAT IIThe Edge SWG must implement multifactor authentication for remote access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.Symantec Edge SWG ALG Security Technical Implementation GuideV-94329CAT IISymantec ProxySG must identify and log internal users associated with denied outgoing communications traffic posing a threat to external information systems.Symantec ProxySG ALG Security Technical Implementation Guide