UCF STIG Viewer Logo

The IDPS must protect against unauthorized physical connections across the boundary protections implemented at organizationally defined list of managed interfaces.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000309-IDPS-000204 SRG-NET-000309-IDPS-000204 SRG-NET-000309-IDPS-000204_rule Medium
Description
Local access to the network can easily be accomplished by merely connecting a workstation or laptop to any available wall plate or a wireless connection to a nearby access point. Eliminating unauthorized access to the network is vital to maintaining a secured network.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43363_chk )
Determine network monitoring using both a wired and a wireless IDS is in place, by asking the site representative.

If the site does not have a WIDS installed, this is a finding.
Fix Text (F-43363_fix)
Install and operate and IDPS and a WIDS on a continuous or periodic basis in a manner consistent with policy requirements.