Finding ID |
Severity |
Title |
Description |
V-242199
|
High |
The TPS must generate a log record so an alert can be configured to, at a minimum, the system administrator when malicious code is detected. |
Without an alert, security personnel may be unaware of an impending failure of the audit capability, and the ability to perform forensic analysis and detect rate-based and other anomalies will be impeded.
The TPS generates an immediate (within seconds) alert which notifies designated personnel of the incident. Sending a message... |
V-242197
|
High |
The SMS must install updates on the TPS for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures. |
Failing to update malicious code protection mechanisms, including application software files, signature definitions, and vendor-provided rules, leaves the system vulnerable to exploitation by recently developed attack methods and programs.
The TPS is a key malicious code protection mechanism in the enclave infrastructure. To ensure this protection is responsive to changes... |
V-242173
|
High |
The Trend Micro TippingPoint Security Management System (SMS) must be configured to send security IPS policy to the Trend Micro Threat Protection System (TPS). |
The flow of all communications traffic must be monitored and controlled so it does not introduce any unacceptable risk to the network infrastructure or data.
Restricting the flow of communications traffic, also known as Information flow control, regulates where information is allowed to travel as opposed to who is allowed... |
V-242206
|
Medium |
The site must register with the Trend Micro TippingPoint Threat Management Center (TMC) in order to receive alerts on threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise. |
Without an alert, security personnel may be unaware of an impending failure of the audit capability, and the ability to perform forensic analysis and detect rate-based and other anomalies will be impeded.
Alerts may be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. The IDPS must... |
V-242205
|
Medium |
The TPS must send an alert to, at a minimum, the ISSM and ISSO when intrusion detection events are detected which indicate a compromise or potential for compromise. |
Without an alert, security personnel may be unaware of intrusion detection incidents that require immediate action and this delay may result in the loss or compromise of information.
In accordance with CCI-001242, the TPS is a real-time intrusion detection system. These systems must generate an alert when detection events from... |
V-242204
|
Medium |
The TPS must continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions. |
If outbound communications traffic is not continuously monitored for unusual/unauthorized activities or conditions, there will be times when hostile activity may not be noticed and defended against.
Although some of the components in the site's content scanning solution may be used for periodic scanning assessment, the IDPS sensors and other... |
V-242203
|
Medium |
The IDPS must continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions. |
If inbound communications traffic is not continuously monitored for unusual/unauthorized activities or conditions, there will be times when hostile activity may not be noticed and defended against.
Although some of the components in the site's content scanning solution may be used for periodic scanning assessment, the IDPS sensors and other... |
V-242202
|
Medium |
The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected. |
Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or serve as malicious rogues for valid services.
Automated mechanisms can be used to send automatic alerts or notifications. Such automatic alerts or notifications can be conveyed in a variety of ways (e.g., telephonically, via... |
V-242201
|
Medium |
The TPS must detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum, through use of a site-approved TPS device profile. |
Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or serve as malicious rogues for valid services.
Examples of network services include service-oriented architectures (SOAs), cloud-based services (e.g., infrastructure as a service, platform as a service, or software as a service), cross-domain, Voice Over... |
V-242198
|
Medium |
The TPS must block malicious code. |
Configuring the TPS to delete and/or quarantine based on local organizational incident handling procedures minimizes the impact of this code on the network. |
V-242196
|
Medium |
The TPS must automatically install updates to signature definitions, detection heuristics, and vendor-provided rules. |
Failing to automatically update malicious code protection mechanisms, including application software files, signature definitions, and vendor-provided rules, leaves the system vulnerable to exploitation by recently developed attack methods and programs. An automatic update process ensures this important task is performed without the need for system administrator intervention.
The TPS is... |
V-242195
|
Medium |
The TPS must block malicious ICMP packets by properly configuring ICMP signatures and rules. |
Internet Control Message Protocol (ICMP) messages are used to provide feedback about problems in the network. These messages are sent back to the sender to support diagnostics. However, some messages can also provide host information, network topology, and a covert channel that may be exploited by an attacker.
Given the... |
V-242194
|
Medium |
The TPS must block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. |
Internet Control Message Protocol (ICMP) messages are used to provide feedback about problems in the network. These messages are sent back to the sender to support diagnostics. However, some messages can also provide host information and network topology that may be exploited by an attacker.
A TPS must be configured... |
V-242193
|
Medium |
The TPS must block outbound traffic containing known and unknown denial-of-service (DoS) attacks by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic. |
The TPS must include protection against DoS attacks that originate from inside the enclave which can affect either internal or external systems. These attacks may use legitimate or rogue endpoints from inside the enclave.
Installation of TPS detection and prevention components (i.e., sensors) at key boundaries in the architecture mitigates... |
V-242192
|
Medium |
The TPS must protect against or limit the effects of known types of denial-of-service (DoS) attacks by employing signatures. |
If the network does not provide safeguards against DoS attack, network resources will be unavailable to users.
Installation of TPS detection and prevention components (i.e., sensors) at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns... |
V-242191
|
Medium |
The TPS must fail to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation (also known as "Fail closed"). |
Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. Preserving information system state information also facilitates system restart and return to the operational mode of the organization with less disruption to mission-essential processes.... |
V-242190
|
Medium |
The TPS must block any prohibited mobile code at the enclave boundary when it is detected. |
Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient. Examples of mobile code include JavaScript, VBScript, Java applets, ActiveX controls, Flash animations, Shockwave videos, and macros embedded... |
V-242189
|
Medium |
The TPS must detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. |
Mobile code is defined as software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient. Examples of mobile code include JavaScript, VBScript, Java applets, ActiveX controls, Flash animations, Shockwave videos, and macros embedded... |
V-242188
|
Medium |
The SMS must be configured to remove or disable nonessential capabilities on SMS and TPS, which are not required for operation or not related to IDPS functionality. |
An IDPS can be capable of providing a wide variety of capabilities. Not all of these capabilities are necessary. Unnecessary services, functions, and applications increase the attack surface (sum of attack vectors) of a system. These unnecessary capabilities are often overlooked and therefore, may remain unsecured.
Examples of unneeded services... |
V-242187
|
Medium |
The SMS and TPS must provide log information in a format that can be extracted and used by centralized analysis tools. |
Centralized review and analysis of log records from multiple SMS and TPS components gives the organization the capability to better detect distributed attacks and provides increased data points for behavior analysis techniques. These techniques are invaluable in monitoring for indicators of complex attack patterns. |
V-242186
|
Medium |
In the event of a logging failure caused by the lack of audit record storage capacity, the SMS must continue generating and storing audit records, overwriting the oldest audit records in a first-in-first-out manner using Audit Log maintenance. |
It is critical that when the TPS is at risk of failing to process audit logs as required, it takes action to mitigate the failure.
The IDPS performs a critical security function, so its continued operation is imperative. Since availability of the TPS is an overriding concern, shutting down the... |
V-242177
|
Medium |
The TPS must provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis. |
To support the centralized analysis capability, the IDPS components must be able to provide the information in a format (e.g., Syslog) that can be extracted and used, allowing the application to effectively review and analyze the log records. |
V-242176
|
Medium |
The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis. |
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one.
While auditing and logging are closely related, they are not the same. Logging is recording data about events that take place in... |
V-242175
|
Medium |
The Trend Micro TPS must immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions which are all contained in the Digital Vaccine (DV) updates. |
Information flow policies regarding dynamic information flow control include, for example, allowing or disallowing information flows based on changes to the PPSM CAL, vulnerability assessments, or mission conditions. Changing conditions include changes in the threat environment and detection of potentially harmful or adverse events.
Changes to the TPS must take... |
V-242172
|
Medium |
To protect against unauthorized data mining, the TPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. |
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack databases may result in the compromise of information.
SQL injection attacks are the most prevalent attacks against web applications... |
V-242171
|
Medium |
To protect against unauthorized data mining, the TPS must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code. |
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack applications may result in the compromise of information.
Injection attacks allow an attacker to inject code into a program... |
V-242170
|
Medium |
To protect against unauthorized data mining, the TPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. |
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack databases may result in the compromise of information.
Injection attacks allow an attacker to inject code into a program... |
V-242169
|
Medium |
To protect against unauthorized data mining, the TPS must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. |
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack databases may result in the compromise of information.
SQL injection attacks are the most prevalent attacks against web applications... |
V-242168
|
Medium |
To protect against unauthorized data mining, the TPS must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code. |
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack applications may result in the compromise of information.
Injection attacks allow an attacker to inject code into a program... |
V-242167
|
Medium |
To protect against unauthorized data mining, the TPS must prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. |
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks that use unauthorized data mining techniques to attack databases may result in the compromise of information.
Injection attacks allow an attacker to inject code into a program... |