Overview
System initialization, shutdown, and aborts are configured to ensure that the system remains in a secure state.
Threat
When systems are in a state of transition, they may be susceptible to unauthorized access or to attack. Means shall be employed to ensure unauthorized changes to the system state are not allowed during transition.
Guidance
1. Identify system transition states and refer to appropriate DISA, NSA, or other approved security technical implementation guide for specific configuration guidance.
DoD classifies this control in the subject area of “Security Design and Configuration” with a impact of “High”.