UCF STIG Viewer Logo

The network element must protect the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34754 SRG-NET-000241-IDPS-NA SV-45664r1_rule Low
Description
Information can be subjected to unauthorized changes (e.g., malicious or unintentional modification) at information aggregation or protocol transformation points. This control is covered as part of the OS SRG and implemented by configuration of a HIDS.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43030r1_chk )
This requirement is NA for IDPS. No fix required.
Fix Text (F-39062r1_fix)
This requirement is NA for IDPS. No fix required.