CCI-002683
Detect network services that have not been authorized or approved by the organization-defined authorization or approval processes.
Symantec ProxySG providing content filtering must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
1 rule found Severity: Medium

1 rule found Severity: Low

The F5 BIG-IP appliance providing content filtering must detect use of network services that have not been authorized or approved by the information system security manager (ISSM) and information system security officer (ISSO), at a minimum.
1 rule found Severity: Medium

The TPS must detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum, through use of a site-approved TPS device profile.
1 rule found Severity: Medium

The ALG providing content filtering must detect use of network services that have not been authorized or approved by the ISSM and ISSO, at a minimum.
1 rule found Severity: Medium

The IDPS must detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum.
1 rule found Severity: Medium
