UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Development systems must have HIDS or HIPS installed and configured with up-to-date signatures.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39438 ENTD0080 SV-51296r1_rule ECID-1 ECSC-1 Medium
Description
A HIDS or HIPS application is a secondary line of defense behind the antivirus. The application will monitor all ports and the dynamic state of a development system. If the application detects irregularities on the system, it will block incoming traffic that may potentially compromise the development system that can lead to a DoS or data theft.
STIG Date
Test and Development Zone C Security Technical Implementation Guide 2018-09-17

Details

Check Text ( C-46713r3_chk )
Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding.

If there isn't any application development occurring in the zone environment, this requirement is not applicable.
Fix Text (F-44451r2_fix)
Install and configure a HIDS or HIPS application on development system images.