UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must associate security attributes with information exchanged between information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34739 SRG-NET-000225-IDPS-00160 SV-45646r1_rule Medium
Description
Security attributes are associated with internal structures within the IDPS application used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented. The IDPS communicates with other systems to transmit notices and sensor logs or to update other network elements (e.g., IPS updating the router or firewall ACLs).
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43012r1_chk )
Verify sensor communications to the base, router, firewall, or central logging server are configured to use specific IP address information and interface/port.

If communications between the IDPS and external network devices are not restricted and clearly defined using specific security attributes, this is a finding.
Fix Text (F-39044r1_fix)
Configure external network communications with IP address information.
Limit the pathway by specifying interfaces to use.