V-222519
Application Security and Development Security Technical Implementation Guide
Title
The application must be configured to use only functions, ports, and protocols permitted to it in the PPSM CAL.
Description
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. Applications are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizationa...
Fix Text (Documentation Requirement)
Configure the application to utilize application ports approved by the PPSM CAL.