UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must establish a trusted communications path between the user and organizationally defined security functions within the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34729 SRG-NET-000214-IDPS-00156 SV-45627r1_rule Medium
Description
The IDPS user interface must provide an unspoofable and faithful communication channel between the user and any entity trusted to manipulate authorities on the user's behalf. To safeguard critical information that could be used by a malicious user to compromise the device or the entire network infrastructure, a trusted path is required for high-confidence connections between the security functions (i.e., login) of the IDPS components and the user.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42993r1_chk )
Verify communications between the IDPS sensors and other trusted entities are configured to use secure paths to access security function (e.g., encryption, hashing, or out-of-band subnets).

If communications between the sensors and the management console are visible on the user or public network, this is a finding.
Fix Text (F-39025r1_fix)
Configure the user interface to use a trusted communications pathway when accessing organizationally defined security functions.