Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34725 | SRG-NET-000210-IDPS-00153 | SV-45621r1_rule | Medium |
Description |
---|
If the organization is relying on a commercial service provider for transmission services as a commodity item rather than a fully dedicated service for both internal and external connectivity, it may be more difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality. When it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42987r1_chk ) |
---|
Open the management application. Inspect the encryption configuration. Verify encryption is automatically used for all data in transit. Verify the device is configured to negotiate a key exchange before full encryption takes place when using approved cryptographic transmission algorithms. If the system is not configured to use cryptographic mechanisms to protect information in transit, this is a finding. |
Fix Text (F-39019r1_fix) |
---|
Configure the IDPS to protect information in transit with cryptographic mechanisms. |