UCF STIG Viewer Logo

The IDPS must continuously monitor for unauthorized remote connections to specific information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000065-IDPS-000014 SRG-NET-000065-IDPS-000014 SRG-NET-000065-IDPS-000014_rule Medium
Description
Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. Monitoring will ensure unauthorized access to the enclave's resources and data will not go undetected.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43127_chk )
Verify the IDPS sensors are positioned in the architecture so traffic from the communications gateway is scanned by the IDPS.

If remote access traffic bypasses the IDPS sensors, this is a finding. If monitoring is not performed continuously, this is a finding.

Fix Text (F-43127_fix)
Logically position the IDPS sensors in the architecture so traffic from the communications gateway is scanned by the IDPS. Continuously monitor for unauthorized remote connections.