UCF STIG Viewer Logo

The IDPS must disable use of organizationally defined networking protocols (on the IDPS components) deemed nonsecure, except for explicitly identified components in support of specific operational requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34533 SRG-NET-000067-IDPS-00056 SV-45375r1_rule Medium
Description
Some networking protocols that allow remote access may not meet the security requirements to protect data and components. The organization can either make a determination as to the relative security of the networking protocol or management console the security decision on the assessment of other entities. Unsecure protocols must be turned off at the device level or the IDPS components may be using these protocols. These protocols are often enabled by default; therefore the system administrator must utilize an explicit command to disable the disallowed protocols.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42724r1_chk )
Verify networking protocols which are not allowed in accordance with organizationally defined policies are disabled.

If networking protocols, which are not allowed in accordance with organizationally defined policies, are not disabled, this is a finding.
Fix Text (F-38772r1_fix)
In the device configuration, disable protocols which are disallowed based on organizationally defined policy.