STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to General Purpose Operating System Security Requirements Guide

V-203661

CAT II (Medium)

The operating system must protect the confidentiality and integrity of all information at rest.

Rule ID

SV-203661r958552_rule

STIG

General Purpose Operating System Security Requirements Guide

Version

V3R3

CCIs

CCI-001199

Discussion

Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. This requirement addresses protection of user-generated data, as well as operating system-specific configuration data. Organizations may choose to employ different mechanisms to achieve confidentiality and integrity protections, as appropriate, in accordance with the security category and/or classification of the information.

Check Content

Verify the operating system protects the confidentiality and integrity of all information at rest. If it does not, this is a finding.

Fix Text

Configure the operating system to protect the confidentiality and integrity of all information at rest.