STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Symantec Edge SWG ALG Security Technical Implementation Guide

V-279222

CAT II (Medium)

The Edge SWG must fail securely in the event of an operational failure.

Rule ID

SV-279222r1170676_rule

STIG

Symantec Edge SWG ALG Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001126

Discussion

If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device may enter, or the device may permit unauthorized information release. Secure failure ensures when a boundary control device fails, all traffic will be subsequently denied. Fail secure is a condition achieved by employing information system mechanisms to ensure, in the event of operational failures of boundary protection devices at managed interfaces (e.g., routers, firewalls, guards, and application gateways residing on protected subnetworks commonly referred to as demilitarized zones), information systems do not enter into unsecure states where intended security properties no longer hold.

Check Content

1. Log in to the Integrated Secure Gateway (ISG) SSH CLI.
2. Enter "enable" and "configure terminal".
3. Enter "bridge view".

If the mode for the bridge in use does not state "fail-closed", this is a finding.

Fix Text

1. Log in to the Integrated Secure Gateway (ISG) SSH CLI.
2. Enter "enable" and "configure terminal".
3. Enter "bridge view".
4. Find the bridge in use for the Edge SWG, e.g., "passthru-2:0".
5. Enter "bridge edit passthru-2:0 mode fail-closed".