UCF STIG Viewer Logo

The IAO will ensure the system alerts an administrator when low resource conditions are encountered.


Overview

Finding ID Version Rule ID IA Controls Severity
V-16840 APP6090 SV-17840r1_rule ECAT-2 Low
Description
In order to prevent DoS type attacks, applications should be monitored when resource conditions reach a predefined threshold indicating there may be attack occurring.
STIG Date
Application Security and Development Checklist 2014-12-22

Details

Check Text ( C-17846r1_chk )
Examine the system to determine if an automated, continuous on-line monitoring and audit trail creation capability is present with the capability to immediately alert personnel of any unusual or inappropriate activity with potential IA implications, and with a user configurable capability to automatically disable the system if serious IA violations are detected.

1) If this monitoring capability does not exist, it is a finding.
Fix Text (F-17161r1_fix)
Implement mechanisms to alert system administrators about a low resource condition.