STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Router Security Requirements Guide

V-278999

CAT II (Medium)

The router must enforce information flow control based on organization-defined metadata.

Rule ID

SV-278999r1137945_rule

STIG

Router Security Requirements Guide

Version

V5R2

CCIs

CCI-000030CCI-000366

Discussion

Enforcing allowed information flows based on metadata enables simpler and more effective flow control. Metadata is information used to describe the characteristics of data. Metadata can include structural metadata describing data structures (e.g., data format, syntax, and semantics) or descriptive metadata describing data contents (e.g., age, location, telephone number). This requirement also applies to Zero Trust initiatives.

Check Content

Verify the router is configured to enforce information flow control based on organization-defined metadata.

If the router does not enforce information flow control based on organization-defined metadata, this is a finding.

Fix Text

Configure the router to enforce information flow control based on organization-defined metadata.