UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must implement host-based boundary protection mechanisms.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000196-IDPS-NA SRG-NET-000196-IDPS-NA SRG-NET-000196-IDPS-NA_rule Medium
Description
The network element, dependent on the underlying operating system, is at greater risk due to software vulnerabilities and access capabilities. It is critical these devices have host-based IDS and firewalls installed and implemented to provide additional security for the network component.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43361_chk )
This requirement does not apply to IDPS.
Fix Text (F-43361_fix)
Not applicable for IDPS. No fix required.