Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000037-IDPS-000157 | SRG-NET-000037-IDPS-000157 | SRG-NET-000037-IDPS-000157_rule | Medium |
Description |
---|
To reduce or eliminate the risk to the network, the IDPS must be configured to disable itself and its components if the IDPS itself is compromised. A list of known attacks to the IDPS system must be included in the rules. Since the IDPS is a major part of the network's protection and defense system, a compromised IDPS may allow malicious attacks to bypass the network's controls. |
STIG | Date |
---|---|
IDPS Security Requirements Guide (SRG) | 2012-03-08 |
Check Text ( C-43297_chk ) |
---|
View the IDPS configuration. Determine if it is configured to automatically disable or block devices using anomaly detection, misuse detection (signature detection), or target monitoring. If the IDPS is not configured to disable itself upon detecting an organizationally defined list of security events, this is a finding. |
Fix Text (F-43297_fix) |
---|
Configure the IDPS to disable itself if organizationally defined events which indicate the system itself has been compromised are detected. |