UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IAO will ensure the system alerts an administrator when low resource conditions are encountered.


Overview

Finding ID Version Rule ID IA Controls Severity
V-16840 APP6090 SV-17840r1_rule ECAT-2 Low
Description
In order to prevent DoS type attacks, applications should be monitored when resource conditions reach a predefined threshold indicating there may be attack occurring.
STIG Date
Application Security and Development Checklist 2014-12-22

Details

Check Text ( C-17846r1_chk )
Examine the system to determine if an automated, continuous on-line monitoring and audit trail creation capability is present with the capability to immediately alert personnel of any unusual or inappropriate activity with potential IA implications, and with a user configurable capability to automatically disable the system if serious IA violations are detected.

1) If this monitoring capability does not exist, it is a finding.
Fix Text (F-17161r1_fix)
Implement mechanisms to alert system administrators about a low resource condition.