Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34533 | SRG-NET-000067-IDPS-00056 | SV-45375r1_rule | Medium |
Description |
---|
Some networking protocols that allow remote access may not meet the security requirements to protect data and components. The organization can either make a determination as to the relative security of the networking protocol or management console the security decision on the assessment of other entities. Unsecure protocols must be turned off at the device level or the IDPS components may be using these protocols. These protocols are often enabled by default; therefore the system administrator must utilize an explicit command to disable the disallowed protocols. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42724r1_chk ) |
---|
Verify networking protocols which are not allowed in accordance with organizationally defined policies are disabled. If networking protocols, which are not allowed in accordance with organizationally defined policies, are not disabled, this is a finding. |
Fix Text (F-38772r1_fix) |
---|
In the device configuration, disable protocols which are disallowed based on organizationally defined policy. |