Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000065-IDPS-000014 | SRG-NET-000065-IDPS-000014 | SRG-NET-000065-IDPS-000014_rule | Medium |
Description |
---|
Remote access services enable users outside of the enclave to have access to data and services within the private network. In many instances these connections traverse the Internet. Monitoring of remote access sessions allows organizations to audit user activities and to ensure compliance with the remote access policy. Monitoring will ensure unauthorized access to the enclave's resources and data will not go undetected. |
STIG | Date |
---|---|
IDPS Security Requirements Guide (SRG) | 2012-03-08 |
Check Text ( C-43127_chk ) |
---|
Verify the IDPS sensors are positioned in the architecture so traffic from the communications gateway is scanned by the IDPS. If remote access traffic bypasses the IDPS sensors, this is a finding. If monitoring is not performed continuously, this is a finding. |
Fix Text (F-43127_fix) |
---|
Logically position the IDPS sensors in the architecture so traffic from the communications gateway is scanned by the IDPS. Continuously monitor for unauthorized remote connections. |