UCF STIG Viewer Logo

The IDPS must prevent the download of prohibited mobile code.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34656 SRG-NET-000288-IDPS-00205 SV-45531r1_rule Medium
Description
Decisions regarding the use of mobile code within the IDPS are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. Prohibited mobile code may contain malicious code and may be the source of network or client attacks if download is allowed.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42880r1_chk )
Verify signatures are installed that prevent the download of prohibited mobile code.

If the system is not configured to take action to prevent the download of prohibited mobile code, this is a finding.
Fix Text (F-38928r1_fix)
Install and configure signatures that monitor for and prevent the download of prohibited mobile code.