UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

An Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor network segments that house network security management servers.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251337 NET-IDPS-019 SV-251337r853644_rule Medium
Description
The initial step in IDPS deployment is determining where sensors should be placed. Because attacks originate at the enclave perimeter and within the enclave boundary an IDPS implementation at the enclave perimeter only will not suffice. By placing IDPS technology throughout the Enterprise Regional enclaves and stand-alone enclaves, system administrators can track the spread of attacks and take corrective actions to prevent attacks reaching critical resources.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2023-02-13

Details

Check Text ( C-54772r805964_chk )
Review the management network topology and verify network security management servers are being monitored by an IDPS.

If an IDPS sensor is not deployed to monitor all segments housing network security management servers, this is a finding.
Fix Text (F-54725r805965_fix)
Install an IDPS to monitor and protect the Management Network (management subnet or OOB network).