STIGhub
STIGs
RMF Controls
Compare
← All Controls
AC-4 (17)
Access Control
Rev 3
Information Flow Enforcement
CCI Identifiers (11)
CCI-000223
The information system binds security attributes to information to facilitate information flow policy enforcement.
CCI-000224
The information system tracks problems associated with the security attribute binding.
CCI-001376
The information system uniquely identifies source domains for information transfer.
CCI-001377
The information system uniquely authenticates source domains for information transfer.
CCI-001555
The information system uniquely identifies destination domains for information transfer.
CCI-001556
The information system uniquely authenticates destination domains for information transfer.
CCI-001557
The information system tracks problems associated with the information transfer.
CCI-002205
Uniquely identify and authenticate source by organization, system, application, service, and/or individual for information transfer.
CCI-002206
The information system uniquely authenticates source by organization, system, application, and/or individual for information transfer.
deprecated
CCI-002207
Uniquely identify and authenticate destination points by organization, system, application, service, and/or individual for information transfer.
CCI-002208
The information system uniquely authenticates destination by organization, system, application, and/or individual for information transfer.
deprecated
Linked STIG Checks (39)
Across 21 STIGs. Click to expand.
▶
Application Layer Gateway Security Requirements Guide
2 checks
▶
Application Server Security Requirements Guide
1 check
▶
Arista MLS DCS-7000 Series RTR Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.2x Router Security Technical Implementation Guide
1 check
▶
Arista MLS EOS 4.X Router Security Technical Implementation Guide
2 checks
▶
Cisco IOS Router RTR Security Technical Implementation Guide
2 checks
▶
Cisco IOS Switch RTR Security Technical Implementation Guide
1 check
▶
Cisco IOS XE Router RTR Security Technical Implementation Guide
2 checks
▶
Cisco IOS XE Switch RTR Security Technical Implementation Guide
2 checks
▶
Cisco IOS XR Router RTR Security Technical Implementation Guide
2 checks
▶
Cisco NX OS Switch RTR Security Technical Implementation Guide
3 checks
▶
HP FlexFabric Switch RTR Security Technical Implementation Guide
1 check
▶
Juniper EX Series Switches Router Security Technical Implementation Guide
3 checks
▶
Juniper Router RTR Security Technical Implementation Guide
3 checks
▶
Layer 2 Switch Security Requirements Guide
2 checks
▶
Router Security Requirements Guide
2 checks
▶
Virtual Private Network (VPN) Security Requirements Guide
2 checks
▶
VMware NSX 4.x Tier-0 Gateway Router Security Technical Implementation Guide
3 checks
▶
VMware NSX Distributed Logical Router Security Technical Implementation Guide
1 check
▶
VMware NSX-T Tier-0 Gateway RTR Security Technical Implementation Guide
2 checks
▶
Web Server Security Requirements Guide
1 check