UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must employ organization-defined controls by type of denial-of-service (DoS) to achieve the DoS objective.


Overview

Finding ID Version Rule ID IA Controls Severity
V-263663 SRG-NET-000705-IDPS-00110 SV-263663r991597_rule Medium
Description
DoS events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth. Such attacks can occur across a wide range of network protocols (e.g., IPv4, IPv6). A variety of technologies are available to limit or eliminate the origination and effects of DoS events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of DoS attacks. Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to DoS events.
STIG Date
Intrusion Detection and Prevention Systems Security Requirements Guide 2024-05-30

Details

Check Text ( C-67576r982262_chk )
Verify the IDPS is configured to employ organization-defined controls by type of DoS to achieve the denial-of-service objective.

If the IDPS is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix Text (F-67484r982263_fix)
Configure the IDPS to employ organization-defined controls by type of DoS to achieve the DoS objective.