STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Virtual Machine Manager Security Requirements Guide

V-207417

CAT II (Medium)

All interactions between guest VMs and external systems, via other interface devices, must be mediated by the VMM or its service VMs.

Rule ID

SV-207417r1138004_rule

STIG

Virtual Machine Manager Security Requirements Guide

Version

V2R3

CCIs

CCI-001414

Discussion

Mechanisms to detect and prevent unauthorized communication flow must be configured or provided as part of the VMM design. If information flow control is not enforced based on proper functioning of the VMM and its service and helper VMs, the VMM may become compromised. Information flow control regulates where information is allowed to travel between a VMM (and its guest VMs) and external systems. In some cases, the VMM may delegate interface device management to a service VM, but the VMM still maintains control of all information flows. The flow of all system information must be monitored and controlled so it does not introduce any unacceptable risk to the VMM, its guest VMs, or data. This requirement also applies to Zero Trust initiatives.

Check Content

Verify all interactions between guest VMs and external systems, via other interface devices, are mediated by the VMM or its service VMs.

If they are not, this is a finding.

Fix Text

Configure all interactions between guest VMs and external systems, via other interface devices, are mediated by the VMM or its service VMs.