Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-16840 | APP6090 | SV-17840r1_rule | ECAT-2 | Low |
Description |
---|
In order to prevent DoS type attacks, applications should be monitored when resource conditions reach a predefined threshold indicating there may be attack occurring. |
STIG | Date |
---|---|
Application Security and Development Checklist | 2014-12-22 |
Check Text ( C-17846r1_chk ) |
---|
Examine the system to determine if an automated, continuous on-line monitoring and audit trail creation capability is present with the capability to immediately alert personnel of any unusual or inappropriate activity with potential IA implications, and with a user configurable capability to automatically disable the system if serious IA violations are detected. 1) If this monitoring capability does not exist, it is a finding. |
Fix Text (F-17161r1_fix) |
---|
Implement mechanisms to alert system administrators about a low resource condition. |