UCF STIG Viewer Logo

The IDPS must establish a trusted communications path between the user and organizationally defined security functions within the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000214-IDPS-000172 SRG-NET-000214-IDPS-000172 SRG-NET-000214-IDPS-000172_rule Medium
Description
To safeguard critical information that could be used by a malicious user to compromise the device or the entire network infrastructure, a trusted path is required for high-confidence connections between the security functions (i.e., login) of the IDPS and the user.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43312_chk )
View the configuration of the IDPS. Verify communications between the IDPS sensors are configured to use subnets which traverse secure, trusted communications paths.

If communications between the sensors and the management console are visible on the user or public network, this is a finding.
Fix Text (F-43312_fix)
Configure the interfaces and IP address uses for communications to use trusted communications methods (e.g., encryption, hashing, or out of band paths.)