STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Application Layer Gateway Security Requirements Guide

V-205009

CAT II (Medium)

The ALG must fail securely in the event of an operational failure.

Rule ID

SV-205009r1138084_rule

STIG

Application Layer Gateway Security Requirements Guide

Version

V2R3

CCIs

CCI-001126

Discussion

If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device may enter, or the device may permit unauthorized information release. Secure failure ensures when a boundary control device fails, all traffic will be subsequently denied. Fail secure is a condition achieved by employing information system mechanisms to ensure in the event of operational failures of boundary protection devices at managed interfaces (e.g., routers, firewalls, guards, and application gateways residing on protected subnetworks commonly referred to as demilitarized zones), information systems do not enter into unsecure states where intended security properties no longer hold. This requirement also applies to Zero Trust initiatives.

Check Content

Verify the ALG fails securely in the event of an operational failure.

If the ALG does not fail securely in the event of an operational failure, this is a finding.

Fix Text

Configure the ALG to fail securely in the event of an operational failure.