|Finding ID||Version||Rule ID||IA Controls||Severity|
|All IDPS data collected by agents in the enclave at required locations must also be protected by logical separation when in transit from the agent to the management or database servers located on the Network Management subnet.|
|Network Infrastructure Policy Security Technical Implementation Guide||2017-03-02|
|Check Text ( C-21132r2_chk )|
| Review the network topology diagram and interview the ISSO to determine how the IDPS traffic between the sensor and the security management or sensor data collection servers is transported. |
If the IDPS traffic does not traverse a dedicated VLAN logically separating IDPS traffic from all other enclave traffic, this is a finding.
|Fix Text (F-19087r1_fix)|
|Design a communications path for OOB traffic or create a VLAN for IDPS traffic to protect the data.|