STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 7 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Traditional Security Checklist

V-245747

CAT III (Low)

Environmental IA Controls - Voltage Control (power)

Rule ID

SV-245747r1138414_rule

STIG

Traditional Security Checklist

Version

V2R8

CCIs

None

Discussion

Failure to use automatic voltage control can result in damage to the IT equipment creating a service outage. REFERENCES: 32 CFR 117 and 32 CFR 2001 and 2003 as well as DOD Manual 5220.32 Volume 1 NIST Special Publication 800-53 (SP 800-53), Rev 4, Controls: PE-9(2) NIST SP 800-12, An Introduction to Computer Security: The NIST Handbook NIST SP 800-100 Information Security Handbook: A Guide for Managers

Check Content

Check there is an IT area voltage control unit and that it is being utilized for all key IT assets.
  
NOTES: This requirement should not be applied to a tactical environment, unless it is a fixed computer facility supporting missions in a Theater of Operations. The standards to be applied for applicability in a tactical environment are:

1) The facility containing the computer room has been in operation over one year. 
2) The facility is "fixed facility" - a hard building made from normal construction materials - wood, steel, brick, stone, mortar, etc.

Fix Text

An Information Technology (IT) area voltage control unit must be installed and used for all key IT assets.