UCF STIG Viewer Logo

Development systems must have HIDS or HIPS installed and configured with up-to-date signatures.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39438 ENTD0080 SV-51296r1_rule ECID-1 ECSC-1 Medium
Description
A HIDS or HIPS application is a secondary line of defense behind the antivirus. The application will monitor all ports and the dynamic state of a development system. If the application detects irregularities on the system, it will block incoming traffic that may potentially compromise the development system that can lead to a DoS or data theft.
STIG Date
Test and Development Zone B Security Technical Implementation Guide 2015-12-17

Details

Check Text ( C-46713r3_chk )
Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding.

If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix Text (F-44451r2_fix)
Install and configure a HIDS or HIPS application on development system images.