STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Network Infrastructure Policy Security Technical Implementation Guide

V-251353

CAT II (Medium)

Network topology diagrams for the enclave must be maintained and up to date at all times.

Rule ID

SV-251353r806014_rule

STIG

Network Infrastructure Policy Security Technical Implementation Guide

Version

V10R7

CCIs

CCI-001098

Discussion

To assist in the management, auditing, and security of the network infrastructure facility drawings and topology maps are a necessity. Topology maps are important because they show the overall layout of the network infrastructure and where devices are physically located. They also show the relationship and interconnectivity between devices and where possible intrusive attacks could take place. Having up to date network topology diagrams will also help show what the security, traffic, and physical impact of adding a new user(s) will be on the network.

Check Content

Validate the network diagram by correlating the information with all routers, multi-layer switches, and firewall configurations.

Validate all subnets have been documented accordingly.

Validate any connectivity documented on the diagram by physically examining the cable connections for the downstream and upstream links, as well as connections for major network components (Routers, Switches, Firewalls, IDS/IPS, etc.).

If the site has not maintained network topology diagrams for the enclave, this is a finding.

Fix Text

Update the enclave's network topology diagram to represent the current state of the network and its connectivity.