UCF STIG Viewer Logo

The IDPS must respond to security function anomalies in accordance with organizationally defined responses and alternative actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34783 SRG-NET-000268-IDPS-00193 SV-45709r1_rule Medium
Description
Verification of security functionality is necessary to ensure the system’s defenses are enabled. These anomalies are detected by running self-tests on each component in the IDPS. For those security functions that are not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Upon detection of security function anomalies or failure of automated self-tests, the IDPS must respond in accordance with organizationally defined responses and alternative actions. If security functionality is not verified, the system could become compromised without the knowledge of the system administrators. If automated self-tests are not available for all devices, then implement one of the following alternatives: (i) Document the risk as accepted. (ii) Provide and document manual testing procedures.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43075r1_chk )
Verify automated self-tests are configured to take action if a failure is detected.

If the system is not configured to respond to security function anomalies in accordance with organizationally defined responses and alternative actions, this is a finding.
Fix Text (F-39106r1_fix)
For all IDPS components, enable automation self-test failure action (e.g., state change, alerts, or alarms).