STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Network Infrastructure Policy Security Technical Implementation Guide

V-251356

CAT II (Medium)

External connections to the network must be reviewed and the documentation updated semi-annually.

Rule ID

SV-251356r806023_rule

STIG

Network Infrastructure Policy Security Technical Implementation Guide

Version

V10R7

CCIs

CCI-001121

Discussion

A network is only as secure as its weakest link. It is imperative that all external connections be reviewed and kept to a minimum needed for operations. All external connections should be treated as untrusted networks. Reviewing who or what the network is connected to empowers the security manager to make sound judgements and security recommendations. Minimizing backdoor circuits and connections reduces the risk for unauthorized access to network resources.

Check Content

Review the network topology and interview the ISSO to verify that external connections to the network are reviewed and documented on a semi-annual basis. 

If there are any external connections that have not been documented, or if the connections are not reviewed on a semi-annual basis, this is a finding.

Fix Text

Implement a semi-annual review process to document and account for external connections to the organization.