STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Router Security Requirements Guide

V-279002

CAT II (Medium)

The router must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.

Rule ID

SV-279002r1137954_rule

STIG

Router Security Requirements Guide

Version

V5R2

CCIs

CCI-002205CCI-000366

Discussion

Attribution is a critical component of a security concept of operations. The ability to identify source and destination points for information flowing in information systems, allows the forensic reconstruction of events when required, and encourages policy compliance by attributing policy violations to specific organizations/individuals. Successful domain authentication requires that information system labels distinguish among systems, organizations, and individuals involved in preparing, sending, receiving, or disseminating information. This requirement applies to routers that transfer information between different security domains (e.g., cross-domain solutions). This requirement also applies to Zero Trust initiatives.

Check Content

Verify the router is configured to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.

If the router does not uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer, this is a finding.

Fix Text

Configure the router to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.