UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must employ automated mechanisms to centrally verify configuration settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34621 SRG-NET-000127-IDPS-00094 SV-45495r1_rule Medium
Description
Uncoordinated or incorrect configuration changes to network components can potentially lead to network outages and possibly compromises. Centrally managing configuration changes for the IDPS can ensure they are done at the correct time and if necessary in synchronization with each other which can be vital for nodes that peer and require compatible configurations. Centralized configuration management also provides visibility and tracking of enterprise level activity promoting a sound configuration management procedure as well as an aid for troubleshooting network problems.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42844r1_chk )
Verify a management console is installed which permits viewing and verification of the configuration of sensors, load balancers, and other IDPS components.

If automated mechanisms to centrally verify configuration settings are not used, this is a finding.
Fix Text (F-38892r1_fix)
Install and configure a management console on the management network.