UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must respond to security function anomalies in accordance with organizationally defined responses and alternative actions.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000268-IDPS-000244 SRG-NET-000268-IDPS-000244 SRG-NET-000268-IDPS-000244_rule Low
Description
Verification of security functionality is necessary to ensure the system's defenses are enabled. These anomalies are detected by running self-tests on each component in the IDPS. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Upon detection of security function anomalies or failure of automated self-tests, the IDPS must respond in accordance with organizationally defined responses and alternative actions. If security functionality is not verified, the systems' defense, the system could have become compromised without the knowledge of the system administrators. If automated self-tests are not available for all devices, then implement one of the following alternatives: (i) Document the risk as accepted. (ii) Provide and document manual testing procedures.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43416_chk )
Verify automated self-tests are configured to take action if the failure is detected.

If the system is not configured to respond to security function anomalies in accordance with organizationally defined responses and alternative actions, this is a finding.
Fix Text (F-43416_fix)
For all IDPS components, enable automation self-test failure action (e.g., state change, alerts, or alarms.)