UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Intrusion Detection and Prevention System (IDPS) traffic between the sensor and the security management or sensor data collection servers must traverse a dedicated Virtual Local Area Network (VLAN) logically separating IDPS traffic from all other enclave traffic.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251340 NET-IDPS-025 SV-251340r805975_rule Medium
Description
All IDPS data collected by agents in the enclave at required locations must also be protected by logical separation when in transit from the agent to the management or database servers located on the Network Management subnet.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2023-02-13

Details

Check Text ( C-54775r805973_chk )
Review the network topology diagram and interview the ISSO to determine how the IDPS traffic between the sensor and the security management or sensor data collection servers is transported.

If the IDPS traffic does not traverse a dedicated VLAN logically separating IDPS traffic from all other enclave traffic, this is a finding.
Fix Text (F-54728r805974_fix)
Design a communications path for OOB traffic or create a VLAN for IDPS traffic to protect the data.