UCF STIG Viewer Logo

The IDPS must protect the confidentiality and integrity of system information at rest.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34752 SRG-NET-000238-IDPS-00172 SV-45662r1_rule Low
Description
This control is intended to address the confidentiality and integrity of system information at rest when it is located on a secondary storage device within the IDPS. It is imperative that system data that is generated as well as device configuration data is protected.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43028r1_chk )
Inspect the encryption configuration settings.
Verify all configuration files, system files, and logs stored on the management console are protected by encryption when at rest.
Verify all configuration files, system files, and logs stored on the sensors are protected by encryption when at rest.

If files and logs stored on the management console or sensors are not encrypted, this is a finding.
Fix Text (F-39060r1_fix)
Enable file encryption for all storage drives in the sensors and management console.