UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must employ automated mechanisms to detect the addition of unauthorized components or devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55305 SRG-APP-000516-NDM-000339 SV-69551r1_rule Medium
Description
This requirement addresses configuration management of the network device. The network device must automatically detect the installation of unauthorized software or hardware onto the device itself. Monitoring may be accomplished on an ongoing basis or by periodic monitoring. Automated mechanisms can be implemented within the network device and/or in another separate information system or device. If the addition of unauthorized components or devices is not automatically detected, then such components or devices could be used for malicious purposes, such as transferring sensitive data to removable media for compromise.
STIG Date
Network Device Management Security Requirements Guide 2015-12-20

Details

Check Text ( C-55925r1_chk )
Determine if the network device employs automated mechanisms to detect the addition of any unauthorized components or devices.

If the network device does not employ automated mechanisms to detect the addition of unauthorized components or devices, this is a finding.
Fix Text (F-60169r1_fix)
Configure the network device to employ automated mechanisms to detect the addition of unauthorized components or devices.