STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Application Security and Development Security Technical Implementation Guide

V-222667

CAT II (Medium)

Protections against DoS attacks must be implemented.

Rule ID

SV-222667r961863_rule

STIG

Application Security and Development Security Technical Implementation Guide

Version

V6R4

CCIs

CCI-002386

Discussion

Known DoS threats documented in the threat model should be mitigated, to prevent DoS type attacks.

Check Content

Ask the application representative for the threat model document.

Examine the threat model document and determine if DoS attacks are specified as a threat.

If there are no DoS threats identified in the threat model, the requirement is not applicable.

Verify the mitigations provided for DoS attacks are implemented from the threat model.

If mitigations for DoS attacks are identified in the threat model but are not implemented, this is a finding.

Fix Text

Implement mitigations from the threat model for DOS attacks.