UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network element must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34693 SRG-NET-000176-IDPS-NA SV-45577r1_rule Low
Description
Lack of authentication enables anyone to gain access to the network or possibly a network element, thus providing an opportunity for intruders to compromise resources within the network infrastructure. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization's security policy. Authorization for access to any network element to perform maintenance and diagnostics requires an individual account identifier that has been approved, assigned, and configured on an authentication server. Authentication of non-local maintenance and diagnostics sessions must be accomplished through two-factor authentication via the combination of passwords, tokens, and biometrics. If packets associated with these sessions are not encrypted, the integrity and confidentiality of non-local maintenance and diagnostics is at risk. Protection of maintenance tools is not a function of the IDPS. This is a network or OS function.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42930r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-38974r1_fix)
This requirement is NA for IDPS. No fix required.