CCI-002080
The organization employs either an allow-all, deny-by-exception or a deny-all, permit-by-exception policy for allowing organization-defined information systems to connect to external information systems.
AIX must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
1 rule found Severity: Medium

A deny-by-default security posture must be implemented for traffic entering and leaving the enclave.
1 rule found Severity: High

IBM z/OS Policy Agent must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
1 rule found Severity: Medium

The IBM z/OS Policy Agent must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
1 rule found Severity: Medium

The IBM z/OS Policy Agent must be configured to deny-all, allow-by-exception firewall policy for allowing connections to other systems.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium
