UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Intrusion Detection System (IDS) Monitoring Station Personnel - Suitability Checks


Overview

Finding ID Version Rule ID IA Controls Severity
V-32457 PE-08.02.01 SV-42794r2_rule PEPF-1 PEPF-2 PRMP-1 PRMP-2 PRNK-1 Medium
Description
Failure to subject personnel who monitor the IDS alarms to a trustworthiness determination can result in the inadvertent or deliberate unauthorized access to, or release of classified material.
STIG Date
Traditional Security 2013-07-11

Details

Check Text ( C-40902r1_chk )
Check that IDS - protecting vaults, secure rooms or spaces containing SIPRNet assets - is monitored by U.S. personnel who have been subject to a trustworthiness check IAW DoD 5200.2-R. Minimally they must be subjects of a successfully adjudicated National Agency Check (NAC).

TACTICAL ENVIRONMENT APPLICABILITY: Apply to fixed tactical environments where IDS is installed to protect SIPRNet and other DISN connected assets.
Fix Text (F-36380r1_fix)
Ensure that IDS - protecting vaults, secure rooms or spaces containing SIPRNet assets - is monitored by U.S. personnel who have been subject to a trustworthiness check IAW DoD 5200.2-R. Minimally they must be subjects of a successfully adjudicated National Agency Check (NAC).