UCF STIG Viewer Logo

The IDPS must protect the confidentiality and integrity of system information at rest.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000238-IDPS-000196 SRG-NET-000238-IDPS-000196 SRG-NET-000238-IDPS-000196_rule Low
Description
This control is intended to address the confidentiality and integrity of system information at rest when it is located on a secondary storage device within the IDPS. It is imperative that system data that is generated as well as device configuration data is protected.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43349_chk )
Inspect the encryption configuration settings.
Verify all configuration files, system files, and logs stored on the management console are protected by encryption when at rest.
Verify all configuration files, system files, and logs stored on the sensors are protected by encryption when at rest.

If files and logs stored on the management console or sensors are not encrypted, this is a finding.

Fix Text (F-43349_fix)
Enable file encryption for all storage drives in for the sensors and management console.