STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Application Layer Gateway Security Requirements Guide

V-204963

CAT II (Medium)

The ALG providing content filtering must update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy.

Rule ID

SV-204963r981632_rule

STIG

Application Layer Gateway Security Requirements Guide

Version

V2R3

CCIs

CCI-004965

Discussion

Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize any potential negative impact to the organization caused by malicious code, malicious code must be identified and eradicated. Malicious code includes viruses, worms, Trojan horses, and spyware. This requirement is limited to ALGs, web content filters, and packet inspection firewalls that perform malicious code detection as part of their functionality.

Check Content

If the ALG does not perform content filtering as part of the traffic management functionality, this is not applicable.

Verify the ALG updates malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.

If the ALG does not update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.

Fix Text

If the ALG performs content filtering as part of the traffic management functionality, configure the ALG to update malicious code protection mechanisms and signature definitions whenever new releases are available in accordance with organizational configuration management policy and procedures.