UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must validate the integrity of security attributes exchanged between information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000226-IDPS-000180 SRG-NET-000226-IDPS-000180 SRG-NET-000226-IDPS-000180_rule Medium
Description
Security attributes are associated with internal structures within the IDPS used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented. The IDPS communicates with other systems to transmit notices and sensor logs or to update other network elements (e.g., IPS updating the router or firewall ACLs).
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43324_chk )
Verify sensor communications include a process for validating the integrity and validity of source IP address and source interface/port when receiving communications from the IDPS base, router, firewall, or central are validated.

If communications between the IDPS and external network devices do not include a process for validating the source IP address and source interface/port, this is a finding.
Fix Text (F-43324_fix)
Configure external network communications with IP address information.
Limit the pathway by specifying interfaces to use.