Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34703 | SRG-NET-000187-IDPS-00136 | SV-45589r1_rule | Medium |
Description |
---|
The IDPS must be designed and configured to minimize the number of non-security functions included within the boundary containing security functions. An isolation boundary, implemented via partitions and domains, must be used to minimize the mixture of these functions, thus minimizing the risk of leakage or corruption of privileged information. This control is normally a function of the IDPS application design and is usually not a configurable setting; however, in some applications, there may be settings that must be configured to optimize function isolation. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42943r1_chk ) |
---|
Verify the application is designed to separate security functions from non-security functions (e.g., use of separate address space) for executing process. If the vendor application design documentation indicates there is no boundary separation between security functions, this is a finding. |
Fix Text (F-38986r1_fix) |
---|
Enable settings to create an isolation boundary. Configure the network boundary to minimize the number of non-security functions included within the boundary which contain security functions. |