STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Virtual Private Network (VPN) Security Requirements Guide

V-279021

CAT II (Medium)

The VPN Gateway must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.

Rule ID

SV-279021r1138050_rule

STIG

Virtual Private Network (VPN) Security Requirements Guide

Version

V3R4

CCIs

CCI-002205CCI-000366

Discussion

Attribution is a critical component of a security concept of operations. The ability to identify source and destination points for information flowing in information systems, allows the forensic reconstruction of events when required, and encourages policy compliance by attributing policy violations to specific organizations/individuals. Successful domain authentication requires that information system labels distinguish among systems, organizations, and individuals involved in preparing, sending, receiving, or disseminating information. This requirement applies to VPN Gateways that transfer information between different security domains (e.g., cross-domain solutions). This requirement also applies to Zero Trust initiatives.

Check Content

Determine if the VPN Gateway uniquely identifies and authenticates source by organization, system, application, and/or individual for information transfer.   

If the VPN Gateway does not uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer, this is a finding.

Fix Text

Configure the VPN Gateway to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.