Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-782 | GEN006480 | SV-41526r2_rule | ECID-1 | Medium |
Description |
---|
Without a host-based intrusion detection tool, there is no system-level defense when an intruder gains access to a system or network. Additionally, a host-based intrusion detection tool can provide methods to immediately lock out detected intrusion attempts. |
STIG | Date |
---|---|
Solaris 10 SPARC Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-285r3_chk ) |
---|
Ask the SA or IAO if a host-based intrusion detection application is loaded on the system. Determine if the application is loaded on the system. Procedure: # find / -name Determine if the application is active on the system. Procedure: # ps -ef | grep If no host-based intrusion detection system is installed on the system, this is a finding. |
Fix Text (F-936r3_fix) |
---|
Install a host-based intrusion detection tool. |