Rule ID
SV-263543r981660_rule
Version
V2R3
CCIs
CCI-004905
Some attack vectors operate by altering the security attributes of an information system to intentionally and maliciously implement an insufficient level of security within the system. The alteration of attributes leads organizations to believe that a greater number of security functions are in place and operational than have actually been implemented.
Verify the ALG is configured to implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process. If the ALG is not configured to implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process, this is a finding.
Configure the ALG to implement antispoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.