UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must generate an alert that will then be sent to the ISSO, ISSM, and other designated personnel (deemed appropriate by the local organization) when the unauthorized installation of software is detected.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55237 SRG-APP-000377-NDM-000301 SV-69483r2_rule Medium
Description
Unauthorized software not only increases risk by increasing the number of potential vulnerabilities, it also can contain malicious code. Sending an alert (in real time) when unauthorized software is detected allows designated personnel to take action on the installation of unauthorized software. Note that while the device must generate the alert, the notification may be done by a management server.
STIG Date
Network Device Management Security Requirements Guide 2018-07-02

Details

Check Text ( C-55857r1_chk )
Determine if the network device generates an alert when the unauthorized installation of software is detected. This requirement may be verified by demonstration or configuration review. The management/audit server that the network device sends alerts to would typically perform the function of sending these alerts to specific individuals.

If the network device does not generate an alert when the unauthorized installation of software is detected, this is a finding.
Fix Text (F-60101r1_fix)
Configure the network device to generate an alert when the unauthorized installation of software is detected.