UCF STIG Viewer Logo

The IDPS must be configured to enable automated mechanisms to enforce access restrictions.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000119-IDPS-000110 SRG-NET-000119-IDPS-000110 SRG-NET-000119-IDPS-000110_rule Medium
Description
Changes to the hardware or software components of the IDPS can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the IDPS for implementing any changes or upgrades.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43241_chk )
Verify automated mechanisms are used to enable access restrictions to the hardware and software for the management console and sensors. Verify security group membership are used when assigning permissions to update and change software and on the management console and sensors. Verify members of this security group are specifically authorized system administrators with a need for this type of access.

If the system is not configured to restrict the ability to perform software changes on the IDPS components to authorized system administrators this is a finding.
Fix Text (F-43241_fix)
Configured the IDPS components to restrict the ability to perform software changes and updates to authorized system administrators only