STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to General Purpose Operating System Security Requirements Guide

V-203661

CAT II (Medium)

The operating system must protect the confidentiality and integrity of all information at rest.

Rule ID

SV-203661r958552_rule

STIG

General Purpose Operating System Security Requirements Guide

Version

V3R3

CCIs

CCI-001199

Discussion

Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. This requirement addresses protection of user-generated data, as well as operating system-specific configuration data. Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate, in accordance with the security category and/or classification of the information.

Check Content

Verify the operating system protects the confidentiality and integrity of all information at rest. If it does not, this is a finding.

Fix Text

Configure the operating system to protect the confidentiality and integrity of all information at rest.