UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55379 SRG-NET-000385-IDPS-00211 SV-69625r2_rule Medium
Description
Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or serve as malicious rogues for valid services. Automated mechanisms can be used to send automatic alerts or notifications. Such automatic alerts or notifications can be conveyed in a variety of ways (e.g., telephonically, via electronic mail, via text message, or via websites). The IDPS must either send the alert to a management console that is actively monitored by authorized personnel or use a messaging capability to send the alert directly to designated personnel. The ISSM or ISSO may designate the SCA or other authorized personnel to receive the alert within the specified time, validate the alert, then forward only validated alerts to the ISSO to the vulnerability discussion.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2017-07-07

Details

Check Text ( C-55995r5_chk )
Verify the IDPS generates an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.

If the IDPS does not generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected, this is a finding.
Fix Text (F-60245r3_fix)
Configure the IDPS to generate an alert to the ISSM and ISSo, at a minimum, when unauthorized network services are detected