Details
Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing information flows based on changes to the Ports, Protocols, Services Management (PPSM) Category Assurance Levels (CAL) list, vulnerability assessments, or mission conditions. Changing conditions include changes in the threat environment and detection of potentially harmful or adverse events.
Solution
Remove the command asp rule-engine transactional-commit access-group
ASA(config)# no asp rule-engine transactional-commit access-group
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Cisco.
References
- 800-53|AC-4
- CAT|II
- CCI|CCI-001414
- Rule-ID|SV-239853r665845_rule
- STIG-ID|CASA-FW-000020
- Vuln-ID|V-239853