STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SC-7 (21) — Boundary Protection

CCI-002415

Definition

Employ boundary protection mechanisms to isolate organization-defined system components supporting organization-defined missions and/or business functions.

Parent Control

SC-7 (21)Boundary ProtectionSystem and Communications Protection

Linked STIG Checks (2)

V-214291CAT IIThe Apache web server must be tuned to handle the operational requirements of the hosted application.Apache Server 2.4 UNIX Site Security Technical Implementation GuideV-242438CAT IIKubernetes API Server must configure timeouts to limit attack surface.Kubernetes Security Technical Implementation Guide