UCF STIG Viewer Logo

The IDPS must validate the integrity of security attributes exchanged between information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34740 SRG-NET-000226-IDPS-00161 SV-45647r1_rule Medium
Description
Security attributes are associated with internal structures within the IDPS used to enable the implementation of access control and flow control policies or support other aspects of the information security policy. It is crucial these attributes are associated and validated to ensure access control and flow control policies are properly implemented. The IDPS communicates with other systems to transmit notices and sensor logs or to update other network elements (e.g., IPS updating the router or firewall ACLs).
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43014r1_chk )
Verify IDPS includes a process for validating the integrity and validity of the source IP address and source interface/port when receiving communications from other network devices.

If communications between the IDPS and external network devices do not include a process for validating the source IP address and source interface/port, this is a finding.
Fix Text (F-39045r1_fix)
Configure external network communications with IP address information and limit the pathway by specifying interfaces to use.