Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34614 | SRG-NET-999999-IDPS-00212 | SV-45483r1_rule | Medium |
Description |
---|
If the IDPS becomes unable to write events to the sensor events log, a critical resource needed for event analysis would be lost. One method of exploiting this vulnerability is for an attacker to cause an auditable event to occur in rapid succession in an attempt to overwhelm the log capacity. The IDPS must provide methods for preventing log processing failures, such as traffic congestion and threshold management mechanisms. The IDPS must have the capability to reject or delay network traffic based on configured threshold levels to prevent overwhelming the sensor log processing capability. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42830r1_chk ) |
---|
Verify there is a rule or signature which monitors for traffic volume thresholds. Verify there is a rule for dropping traffic that exceeds these thresholds. Examine the traffic priority screens to see if this feature is used by the organization. If the IDPS does not reject or delay network traffic based on normal volume thresholds, this is a finding. |
Fix Text (F-38880r1_fix) |
---|
Configure IDPS to monitor for traffic volume patterns that exceed the norm for the network. Configure the IDPS to notify, alert, drop or delay suspect traffic based on excessive volume. Configure the network with organizationally defined traffic priorities. |