UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must employ automated mechanisms to centrally apply configuration settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34617 SRG-NET-000126-IDPS-00093 SV-45487r1_rule Low
Description
Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42836r1_chk )
Verify a management console is installed which provides central configuration of sensors, load balances, and other IDPS components.
Verify system administrators can connect to the sensors from the central management console.

If automated mechanisms are not used to centrally apply configuration settings, this is a finding.
Fix Text (F-38884r1_fix)
Install and configure a management console on the management network. Use this console to configure sensors and other components.