Capacity
CCI-002683
Detect network services that have not been authorized or approved by the organization-defined authorization or approval processes.
Choose one
2
Rule
Severity: Medium
The ALG providing content filtering must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
2
Rule
Severity: Medium
The IDPS must detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum.
1
Rule
Severity: Medium
Symantec ProxySG providing content filtering must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
2
Rule
Severity: Medium
The TPS must detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum, through use of a site-approved TPS device profile.
1
Rule
Severity: Low
WLAN signals must not be intercepted outside areas authorized for WLAN access.
4
Rule
Severity: Medium
The Palo Alto Networks security platform must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
1
Rule
Severity: Medium
The F5 BIG-IP appliance providing content filtering must detect use of network services that have not been authorized or approved by the information system security manager (ISSM) and information system security officer (ISSO), at a minimum.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%