STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Firewall Security Requirements Guide

Version

V3R3

Release Date

Sep 22, 2025

SCAP Benchmark ID

Firewall_SRG

Total Checks

35

Tags

network
CAT I: 3CAT II: 30CAT III: 2

This Security Requirements Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (35)

V-206674HIGHThe firewall must be configured to use filters that use packet headers and packet attributes, including source and destination IP addresses and ports, to prevent the flow of unauthorized or suspicious traffic between interconnected networks with different security policies (including perimeter firewalls and server VLANs).V-206675MEDIUMThe firewall must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.V-206676MEDIUMThe firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.V-206678MEDIUMThe firewall must generate traffic log entries containing information to establish what type of events occurred.V-206679MEDIUMThe firewall must generate traffic log entries containing information to establish when (date and time) the events occurred.V-206680MEDIUMThe firewall must generate traffic log entries containing information to establish the location on the network where the events occurred.V-206681LOWThe firewall must generate traffic log entries containing information to establish the source of the events, such as the source IP address at a minimum.V-206682MEDIUMThe firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.V-206685MEDIUMThe firewall must be configured to use TCP when sending log records to the central audit server.V-206687MEDIUMThe firewall must protect the traffic log from unauthorized modification of local log records.V-206688MEDIUMThe firewall must protect the traffic log from unauthorized deletion of local log files and log records.V-206690MEDIUMThe firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.V-206692MEDIUMThe firewall must block outbound traffic containing denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.V-206693MEDIUMThe firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.V-206694HIGHThe firewall must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).V-206695MEDIUMThe perimeter firewall must filter traffic destined to the internal enclave in accordance with the specific traffic that is approved and registered in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL), Vulnerability Assessments (VAs) for that the enclave.V-206696MEDIUMThe firewall must fail to a secure state upon the failure of the following: system initialization, shutdown, or system abort.V-206698MEDIUMIn the event of a system failure of the firewall function, the firewall must be configured to save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.V-206699MEDIUMThe firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.V-206700MEDIUMIf communication with the central audit server is lost, the firewall must generate a real-time alert to, at a minimum, the systems adminsitrator (SA) and information system security officer (ISSO).V-206701HIGHThe firewall must employ filters that prevent or limit the effects of all types of commonly known denial-of-service (DoS) attacks, including flooding, packet sweeps, and unauthorized port scanning.V-206703MEDIUMThe firewall must apply ingress filters to traffic that is inbound to the network through any active external interface.V-206704MEDIUMThe firewall must apply egress filters to traffic that is outbound from the network through any internal interface.V-206707MEDIUMThe premise firewall (located behind the premise router) must block all outbound management traffic.V-206708MEDIUMThe firewall must restrict traffic entering the VPN tunnels to the management network to only the authorized management packets based on destination address.V-206711LOWThe firewall must generate an alert that can be forwarded to, at a minimum, the ISSO and ISSM when denial-of-service (DoS) incidents are detected.V-206713MEDIUMThe firewall must generate traffic log records when traffic is denied, restricted, or discarded.V-206714MEDIUMThe firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.V-223011MEDIUMThe firewall must be configured to inspect all inbound and outbound traffic at the application layer.V-223012MEDIUMThe firewall must be configured to inspect all inbound and outbound IPv6 traffic for unknown or out-of-order extension headers.V-223013MEDIUMThe firewall must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).V-263647MEDIUMThe firewall must be configured to employ organization-defined controls by type of denial-of-service (DoS) to achieve the DoS objective.V-263648MEDIUMThe firewall must be configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.V-263649MEDIUMThe firewall must be configured to establish organization-defined alternate communications paths for system operations organizational command and control.V-278972MEDIUMThe firewall must use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.