UCF STIG Viewer Logo

IDPS must support centralized management and configuration of the content captured in audit records generated by all IDPS components.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55323 SRG-NET-000333-IDPS-00190 SV-69569r1_rule Medium
Description
Without the ability to centrally manage the content captured in the log records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a delayed or incomplete analysis of an attack. Centralized management and storage of log records increases efficiency in maintenance and management of records as well as facilitates the backup and archiving of those records. The IDPS must be configured to support centralized management and configuration of the content to be captured in audit records generated by all network components. IDPS sensors and consoles must have the capability to support centralized logging. They must be configured to send log messages to centralized, redundant servers and be capable of being remotely configured to change logging parameters (such as facility and severity levels).
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2020-06-12

Details

Check Text ( C-55945r1_chk )
Verify the IDPS is configured to support centralized management and configuration of the content captured in audit records generated by all IDPS components.

If the IDPS does not support centralized management and configuration of the content captured in audit records generated by all IDPS components, this is a finding.
Fix Text (F-60189r1_fix)
Configure the IDPS to support centralized management and configuration of the content captured in audit records generated by all IDPS components.