V-222590
Application Security and Development Security Technical Implementation Guide
Title
The application must isolate security functions from non-security functions.
Description
<VulnDiscussion>An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Developers and implementers can increase the assurance in security functions by employing well-defined security po...
Fix Text (Documentation Requirement)
Implement controls within the application that limits access to security configuration functionality and isolates regular application function from security-oriented function.