UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Intrusion detection software must be able to interconnect using standard protocols to create a system-wide intrusion detection system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35123 SRG-APP-000281-AS-NA SV-46410r1_rule Medium
Description
When utilizing intrusion detection software, monitoring components are usually dispersed throughout the network, such as when utilizing HIDS and multiple NIDS sensors. In order to leverage the capabilities of intrusion detection systems to get a complete overall view of network and host activity, these separate components must be able to report and react to activity they detect. Non-standard or custom communication protocols do not provide the reliability and veracity required of an enterprise class intrusion detection system. An example of a custom protocol includes, but is not limited to, vendor-specific communication protocols that have not undergone IETF RFC evaluation and/or are not in common use throughout the Internet as a whole. Application servers do not provide IDS capability. Does not apply.
STIG Date
Application Server Security Requirements Guide 2013-01-08

Details

Check Text ( C-43511r1_chk )
This requirement is NA for the AS SRG.
Fix Text (F-39675r1_fix)
The requirement is NA. No fix is required.