Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-39438 | ENTD0080 | SV-51296r1_rule | ECID-1 ECSC-1 | Medium |
Description |
---|
A HIDS or HIPS application is a secondary line of defense behind the antivirus. The application will monitor all ports and the dynamic state of a development system. If the application detects irregularities on the system, it will block incoming traffic that may potentially compromise the development system that can lead to a DoS or data theft. |
STIG | Date |
---|---|
Test and Development Zone A Security Technical Implementation Guide | 2015-12-17 |
Check Text ( C-46713r3_chk ) |
---|
Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable. |
Fix Text (F-44451r2_fix) |
---|
Install and configure a HIDS or HIPS application on development system images. |