Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-227952 | GEN006480 | SV-227952r603266_rule | Medium |
Description |
---|
Without a host-based intrusion detection tool, there is no system-level defense when an intruder gains access to a system or network. Additionally, a host-based intrusion detection tool can provide methods to immediately lock out detected intrusion attempts. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2020-12-04 |
Check Text ( C-30114r490276_chk ) |
---|
Ask the SA or IAO if a host-based intrusion detection application is loaded on the system. Determine if the application is loaded on the system. Procedure: # find / -name Determine if the application is active on the system. Procedure: # ps -ef | grep If no host-based intrusion detection system is installed on the system, this is a finding. |
Fix Text (F-30102r490277_fix) |
---|
Install a host-based intrusion detection tool. |