UCF STIG Viewer Logo

The IPS must enforce approved authorizations for controlling the flow of information within the network in accordance with applicable policy.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000018-IDPS-000041 SRG-NET-000018-IDPS-000041 SRG-NET-000018-IDPS-000041_rule Medium
Description
Information flow control regulates where information is allowed to travel within a network and between interconnected networks. The flow of all network traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data. Examples of flow control restrictions include blocking outside traffic claiming to be from within the organization, and not passing any web requests to the Internet not from the internal web proxy.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43159_chk )
View the rules on the IPS.
Verify rules exist enforcing the allowed traffic on each subnet or VLAN (e.g., rules enforced monitoring the DMZ, management network, perimeter sensor rules should be different) to help control and restrict traffic flows.

If the IPS is not configured to enforce restrictions for traffic flow based organizational policy, this is a finding.
Fix Text (F-43159_fix)
Create rules to control the flow of information within the network in accordance with applicable policy.