UCF STIG Viewer Logo

The IDPS must associate security attributes with information exchanged between information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000225-IDPS-000181 SRG-NET-000225-IDPS-000181 SRG-NET-000225-IDPS-000181_rule Medium
Description
Security attributes are associated with internal structures within the IDPS application used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented. The IDPS communicates with other systems to transmit notices and sensor logs or to update other network elements (e.g., IPS updating the router or firewall ACLs).
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43325_chk )
Verify sensor communications to the base, router, firewall, or central logging server are configured to use specific IP address information and interface/port.

If communications between the IDPS and external network devices is not restricted and clearly defined using specific security attributes, this is a finding.
Fix Text (F-43325_fix)
Configure external network communications with IP address information.
Limit the pathway by specifying interfaces to use.