STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Layer 2 Switch Security Requirements Guide

V-278981

CAT II (Medium)

The layer 2 switch must validate the integrity of transmitted security attributes.

Rule ID

SV-278981r1137768_rule

STIG

Layer 2 Switch Security Requirements Guide

Version

V3R4

CCIs

CCI-001158

Discussion

If security attributes are not associated with the information being transmitted between components, then access control policies and information flows that depend on these security attributes will not function and unauthorized access may result. When data is exchanged, the security attributes associated with this data must be validated to ensure the data has not been changed. Security attributes are values associated with data content/structure and source/destination objects. These attributes are bound to the user and data objects and may include information about the data's purpose, creator, origin, access restrictions, access permissions, or classification. Specific security attributes used depend on the application or technology context. However, these attributes are used in information systems to implement security policy for access control and flow control for users, data, and traffic. Security attributes may be explicitly or implicitly associated with the information contained within the information system. Validation checking can be performed by various means, such as using a cryptographic hash function, boundary checking of values, checksums, or message authentication code. This requirement also applies to Zero Trust initiatives.

Check Content

Verify the layer 2 switch is configured to validate the integrity of transmitted security attributes.

If the layer 2 switch does not validate the integrity of transmitted security attributes, this is a finding.

Fix Text

Configure the layer 2 switch to validate the integrity of transmitted security attributes.