Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-IDPS-000181
- Vuln IDs
-
- SRG-NET-000318-IDPS-000181
- Rule IDs
-
- SRG-NET-000318-IDPS-000181_rule
Checks: C-SRG-NET-000318-IDPS-000181_chk
Verify the IDPS prevents code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the IDPS does not prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-SRG-NET-000318-IDPS-000181_fix
Configure the IDPS components to prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-IDPS-000182
- Vuln IDs
-
- SRG-NET-000318-IDPS-000182
- Rule IDs
-
- SRG-NET-000318-IDPS-000182_rule
Checks: C-SRG-NET-000318-IDPS-000182_chk
Verify the IDPS prevents code injection attacks launched against application objects including, at a minimum, application URLs and application code. If the IDPS does not prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-SRG-NET-000318-IDPS-000182_fix
Configure the IDPS to prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-IDPS-000183
- Vuln IDs
-
- SRG-NET-000318-IDPS-000183
- Rule IDs
-
- SRG-NET-000318-IDPS-000183_rule
Checks: C-SRG-NET-000318-IDPS-000183_chk
Verify the IDPS monitors for SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the IDPS does not monitor for SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-SRG-NET-000318-IDPS-000183_fix
Configure the IDPS to monitor for SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-IDPS-000184
- Vuln IDs
-
- SRG-NET-000319-IDPS-000184
- Rule IDs
-
- SRG-NET-000319-IDPS-000184_rule
Checks: C-SRG-NET-000319-IDPS-000184_chk
Verify the IDPS detects code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the IDPS does not detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-SRG-NET-000319-IDPS-000184_fix
Configure the IDPS components to detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-IDPS-000185
- Vuln IDs
-
- SRG-NET-000319-IDPS-000185
- Rule IDs
-
- SRG-NET-000319-IDPS-000185_rule
Checks: C-SRG-NET-000319-IDPS-000185_chk
Verify the IDPS detects code injection attacks launched against application objects including, at a minimum, application URLs and application code. If the IDPS does not detect code injection attacks launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-SRG-NET-000319-IDPS-000185_fix
Configure the IDPS to detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-IDPS-000186
- Vuln IDs
-
- SRG-NET-000319-IDPS-000186
- Rule IDs
-
- SRG-NET-000319-IDPS-000186_rule
Checks: C-SRG-NET-000319-IDPS-000186_chk
Verify the IDPS detects SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the IDPS does not detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-SRG-NET-000319-IDPS-000186_fix
Configure the IDPS to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-IDPS-000018
- Vuln IDs
-
- SRG-NET-000018-IDPS-000018
- Rule IDs
-
- SRG-NET-000018-IDPS-000018_rule
Checks: C-SRG-NET-000018-IDPS-000018_chk
Verify the IDPS enforces approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network as defined in the PPSM CAL and vulnerability assessments. If the IDPS does not enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-SRG-NET-000018-IDPS-000018_fix
Configure the IDPS to enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-IDPS-000019
- Vuln IDs
-
- SRG-NET-000019-IDPS-000019
- Rule IDs
-
- SRG-NET-000019-IDPS-000019_rule
Checks: C-SRG-NET-000019-IDPS-000019_chk
Verify the IDPS enforces approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks as defined in the PPSM CAL and vulnerability assessments. If the IDPS does not enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-SRG-NET-000019-IDPS-000019_fix
Configure the IDPS to enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-IDPS-000187
- Vuln IDs
-
- SRG-NET-000019-IDPS-000187
- Rule IDs
-
- SRG-NET-000019-IDPS-000187_rule
Checks: C-SRG-NET-000019-IDPS-000187_chk
Verify the IDPS immediately uses updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions. If the IDPS does not immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms to traffic detection and prevention functions, this is a finding.
Fix: F-SRG-NET-000019-IDPS-000187_fix
Configure the IDPS to immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-IDPS-000188
- Vuln IDs
-
- SRG-NET-000019-IDPS-000188
- Rule IDs
-
- SRG-NET-000019-IDPS-000188_rule
Checks: C-SRG-NET-000019-IDPS-000188_chk
Verify the IDPS uses the most recent updates made to policy filters, rules, signatures, and anomaly analysis algorithms upon reboot. If the IDPS does not use the most recent updates made to policy filters, rules, signatures, and anomaly analysis algorithms upon reboot, this is a finding.
Fix: F-SRG-NET-000019-IDPS-000188_fix
Configure the IDPS to use the most recent updates made to policy filters, rules, signatures, and anomaly analysis algorithms upon reboot.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-IDPS-000013
- Vuln IDs
-
- SRG-NET-000113-IDPS-000013
- Rule IDs
-
- SRG-NET-000113-IDPS-000013_rule
Checks: C-SRG-NET-000113-IDPS-000013_chk
Verify the configuration provides audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis. If the IDPS does not provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis, this is a finding.
Fix: F-SRG-NET-000113-IDPS-000013_fix
Configure the IDPS to provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-IDPS-000082
- Vuln IDs
-
- SRG-NET-000113-IDPS-000082
- Rule IDs
-
- SRG-NET-000113-IDPS-000082_rule
Checks: C-SRG-NET-000113-IDPS-000082_chk
Verify the configuration provides audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis algorithms. If the IDPS does not provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis, this is a finding.
Fix: F-SRG-NET-000113-IDPS-000082_fix
Configure the IDPS to provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis algorithms.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-IDPS-000189
- Vuln IDs
-
- SRG-NET-000113-IDPS-000189
- Rule IDs
-
- SRG-NET-000113-IDPS-000189_rule
Checks: C-SRG-NET-000113-IDPS-000189_chk
Verify the configuration provides audit record generation with a configurable severity and escalation level capability. If the IDPS does not provide audit record generation with a configurable severity and escalation level capability, this is a finding.
Fix: F-SRG-NET-000113-IDPS-000189_fix
Configure the IDPS to provide audit record generation with a configurable severity and escalation level capability.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-IDPS-000059
- Vuln IDs
-
- SRG-NET-000074-IDPS-000059
- Rule IDs
-
- SRG-NET-000074-IDPS-000059_rule
Checks: C-SRG-NET-000074-IDPS-000059_chk
Examine the audit log configuration on the IDPS components or view several alert records on the organization's central audit log server. Verify the entries sent to the audit log include, at a minimum, reporting device name, event descriptions, policy filter, rule, or signature invoked, source and destination address, port, protocol, alert code or description. If the audit log event records does not include, at a minimum, reporting device name, event descriptions, policy filter, rule, or signature invoked, source and destination address, port, protocol, alert code or description, this is a finding.
Fix: F-SRG-NET-000074-IDPS-000059_fix
Configure the IDPS components to ensure entries sent to the audit log include sufficient information to determine the type or category for each audit event recorded in the audit log, including, at a minimum, reporting device name, event descriptions, policy filter, rule, or signature invoked, source and destination address, port, protocol, alert code or description.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-IDPS-000060
- Vuln IDs
-
- SRG-NET-000075-IDPS-000060
- Rule IDs
-
- SRG-NET-000075-IDPS-000060_rule
Checks: C-SRG-NET-000075-IDPS-000060_chk
Examine the audit log configuration on the IDPS components or view several alert records on the organization's central audit log server. Verify the entries sent to the audit log include the date and time of each event. If the audit log event records do not include the date and time the events occurred, this is a finding.
Fix: F-SRG-NET-000075-IDPS-000060_fix
Configure the IDPS components to include the date time stamp of events in log messages.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-IDPS-000061
- Vuln IDs
-
- SRG-NET-000076-IDPS-000061
- Rule IDs
-
- SRG-NET-000076-IDPS-000061_rule
Checks: C-SRG-NET-000076-IDPS-000061_chk
Examine the audit log configuration on the IDPS components or view several alert records on organization's central audit log server. Verify the entries sent to the audit log include, at a minimum, enclave and sub-enclave, node names, network element name, module, and sub-system as accurately as possible. If the audit log events do not include, at a minimum, enclave and sub-enclave, node names, network element name, module, and sub-system as accurately as possible, this is a finding.
Fix: F-SRG-NET-000076-IDPS-000061_fix
Configure the IDPS components to ensure log entries include, at a minimum, enclave and sub-enclave, node names, network element name, module, and sub-system as accurately as possible.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-IDPS-000062
- Vuln IDs
-
- SRG-NET-000077-IDPS-000062
- Rule IDs
-
- SRG-NET-000077-IDPS-000062_rule
Checks: C-SRG-NET-000077-IDPS-000062_chk
Verify configuration produces audit records containing information to establish the source of the event, including, at a minimum, originating source address, process, node, or device name. If the IDPS does not produce audit records containing information to establish the source of the event, including, at a minimum, originating source address, process, node, or device name, this is a finding.
Fix: F-SRG-NET-000077-IDPS-000062_fix
Configure the IDPS to produce audit records containing information to establish the source of the event, including, at a minimum, originating source address, process, node, or device name.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-IDPS-000063
- Vuln IDs
-
- SRG-NET-000078-IDPS-000063
- Rule IDs
-
- SRG-NET-000078-IDPS-000063_rule
Checks: C-SRG-NET-000078-IDPS-000063_chk
Examine the audit log configuration on the IDPS components or view several alert records on organization's central audit log server. Verify the entries sent to the audit log include, at a minimum, capturing all associated traffic, the systems accessed, and commands executed on the accessed systems, and the success/failure of these commands. If the audit log event records do not include, at a minimum, capturing all associated traffic, the systems accessed, and commands executed on the accessed systems, and the success/failure of these commands, this is a finding.
Fix: F-SRG-NET-000078-IDPS-000063_fix
Configure the IDPS components to ensure entries sent to the audit log include, at a minimum, capturing all associated traffic, the systems accessed, and commands executed on the accessed systems, and the success/failure of these commands.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-IDPS-000064
- Vuln IDs
-
- SRG-NET-000079-IDPS-000064
- Rule IDs
-
- SRG-NET-000079-IDPS-000064_rule
Checks: C-SRG-NET-000079-IDPS-000064_chk
Examine the audit log configuration on the IDPS components or view several alert records on organization's central audit log server. Verify the audit records contain information to establish the identity of any individual or process associated with the event, including, at a minimum, user or process identifiers. If the audit log event records do not include, at a minimum, the user or process identifiers associated with the event, this is a finding.
Fix: F-SRG-NET-000079-IDPS-000064_fix
Configure the IDPS components to ensure entries sent to the audit log include, at a minimum, the user or process identifiers associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-NET-000333-IDPS-000190
- Vuln IDs
-
- SRG-NET-000333-IDPS-000190
- Rule IDs
-
- SRG-NET-000333-IDPS-000190_rule
Checks: C-SRG-NET-000333-IDPS-000190_chk
Verify the IDPS is configured to support centralized management and configuration of the content captured in audit records generated by all IDPS components. If the IDPS does not support centralized management and configuration of the content captured in audit records generated by all IDPS components, this is a finding.
Fix: F-SRG-NET-000333-IDPS-000190_fix
Configure the IDPS to support centralized management and configuration of the content captured in audit records generated by all IDPS components.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000334-IDPS-000191
- Vuln IDs
-
- SRG-NET-000334-IDPS-000191
- Rule IDs
-
- SRG-NET-000334-IDPS-000191_rule
Checks: C-SRG-NET-000334-IDPS-000191_chk
Verify the IDPS off-loads log records to a centralized log server. If the IDPS does not off-load log records to a centralized log server, this is a finding.
Fix: F-SRG-NET-000334-IDPS-000191_fix
Configure the IDPS to off-load log records to a centralized log server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000511-IDPS-000012
- Vuln IDs
-
- SRG-NET-000511-IDPS-000012
- Rule IDs
-
- SRG-NET-000511-IDPS-000012_rule
Checks: C-SRG-NET-000511-IDPS-000012_chk
Verify the IDPS off-loads log records to a centralized log server in real time. If the IDPS does not off-load log records to a centralized log server in real time, this is a finding.
Fix: F-SRG-NET-000511-IDPS-000012_fix
Configure the IDPS to off-load log records to a centralized log server in real time.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-IDPS-000014
- Vuln IDs
-
- SRG-NET-000335-IDPS-000014
- Rule IDs
-
- SRG-NET-000335-IDPS-000014_rule
Checks: C-SRG-NET-000335-IDPS-000014_chk
Verify the IDPS provides a real time alert (i.e., the time from event detection to alert occurs in seconds or less) to the SA and IAO, at a minimum, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the IDPS does not provide a real time alert to the SA and IAO, at a minimum, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Fix: F-SRG-NET-000335-IDPS-000014_fix
Configure the IDPS to provide a real time alert to the SA and IAO, at a minimum, of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-NET-000088-IDPS-000068
- Vuln IDs
-
- SRG-NET-000088-IDPS-000068
- Rule IDs
-
- SRG-NET-000088-IDPS-000068_rule
Checks: C-SRG-NET-000088-IDPS-000068_chk
Verify the IDPS alerts the IAO and SA (at a minimum) in the event of an audit processing failure where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the IDPS does not alert the IAO and SA (at a minimum) in the event of an audit processing failure where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Fix: F-SRG-NET-000088-IDPS-000068_fix
Configure the IDPS to alert the IAO and SA (at a minimum) in the event of an audit processing failure where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-IDPS-000069
- Vuln IDs
-
- SRG-NET-000089-IDPS-000069
- Rule IDs
-
- SRG-NET-000089-IDPS-000069_rule
Checks: C-SRG-NET-000089-IDPS-000069_chk
Verify the IDPS, in the event of a logging failure caused by the lack of audit record storage capacity, continues generating and storing audit records and overwriting the oldest audit records in a first-in-first-out manner. In the event of a logging failure caused by the lack of audit record storage capacity, if the IDPS does not continue generating and storing audit records and overwriting the oldest audit records in a first-in-first-out manner, this is a finding.
Fix: F-SRG-NET-000089-IDPS-000069_fix
Configure the IDPS, in the event of a logging failure caused by the lack of audit record storage capacity, to continue generating and storing audit records and overwriting the oldest audit records in a first-in-first-out manner.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-IDPS-000010
- Vuln IDs
-
- SRG-NET-000089-IDPS-000010
- Rule IDs
-
- SRG-NET-000089-IDPS-000010_rule
Checks: C-SRG-NET-000089-IDPS-000010_chk
Verify the IDPS, in the event of a logging failure caused by loss of communications with the central logging server, queues audit records locally until communication is restored or until the audit records are retrieved manually. In the event of a logging failure caused by loss of communications with the central logging server, if the IDPS does not queue audit records locally until communication is restored or until the audit records are retrieved manually, this is a finding.
Fix: F-SRG-NET-000089-IDPS-000010_fix
Configure the IDPS, in the event of a logging failure caused by loss of communications with the central logging server, to queue audit records locally until communication is restored or until the audit records are retrieved manually.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-NET-000089-IDPS-000192
- Vuln IDs
-
- SRG-NET-000089-IDPS-000192
- Rule IDs
-
- SRG-NET-000089-IDPS-000192_rule
Checks: C-SRG-NET-000089-IDPS-000192_chk
Verify the IDPS, in the event of a logging failure caused by loss of communications with the central logging server, synchronizes the local audit data with the collection server when the connection is restored. If the IDPS does not synchronize the local audit data with the collection server when communications with the central logging server is restored, this is a finding.
Fix: F-SRG-NET-000089-IDPS-000192_fix
Configure the IDPS to synchronize the local audit data with the collection server when communications with the central logging server is restored.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-NET-000091-IDPS-000193
- Vuln IDs
-
- SRG-NET-000091-IDPS-000193
- Rule IDs
-
- SRG-NET-000091-IDPS-000193_rule
Checks: C-SRG-NET-000091-IDPS-000193_chk
Verify the IDPS supports the centralized review and analysis of log records from multiple sensors, IDS, IPS, and other IDPS components by providing the information in a format (e.g., Syslog) that can be extracted and used by analysis tools. If the IDPS does not support the centralized review and analysis of log records from multiple sensors, IDS, IPS, and other IDPS components by providing the information in a format that can be extracted and used by analysis tools, this is a finding.
Fix: F-SRG-NET-000091-IDPS-000193_fix
Configure the IDPS to support the centralized review and analysis of log records from multiple sensors, IDS, IPS, and other IDPS components by providing the information in a format that can be extracted and used by analysis tools.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-IDPS-000194
- Vuln IDs
-
- SRG-NET-000512-IDPS-000194
- Rule IDs
-
- SRG-NET-000512-IDPS-000194_rule
Checks: C-SRG-NET-000512-IDPS-000194_chk
Verify the IDPS is configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. If the IDPS is not configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices, this is a finding.
Fix: F-SRG-NET-000512-IDPS-000194_fix
Configure the IDPS to comply with the security configuration settings based on DoD security policy and technology-specific security best practices.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-IDPS-000011
- Vuln IDs
-
- SRG-NET-000131-IDPS-000011
- Rule IDs
-
- SRG-NET-000131-IDPS-000011_rule
Checks: C-SRG-NET-000131-IDPS-000011_chk
Have the SA display the services running on the IDPS components. Review the IDPS configuration to determine if non-essential capabilities not required for operation, or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If the IDPS is not configured to remove or disable non-essential capabilities which are not required for operation or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server), this is a finding.
Fix: F-SRG-NET-000131-IDPS-000011_fix
Remove or disable non-essential capabilities from the IDPS. Removal is recommended since the service or function may be inadvertently enabled. However, if removal is not possible, disable the service or function. Document all necessary services.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-IDPS-000097
- Vuln IDs
-
- SRG-NET-000131-IDPS-000097
- Rule IDs
-
- SRG-NET-000131-IDPS-000097_rule
Checks: C-SRG-NET-000131-IDPS-000097_chk
Verify the IDPS is configured to remove or disable non-essential features, functions, and services of the IDPS application. If the IDPS is not configured to remove or disable non-essential features, functions, and services of the IDPS application, this is a finding.
Fix: F-SRG-NET-000131-IDPS-000097_fix
Configure the IDPS to remove or disable non-essential features, functions, and services of the IDPS application.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-IDPS-000195
- Vuln IDs
-
- SRG-NET-000132-IDPS-000195
- Rule IDs
-
- SRG-NET-000132-IDPS-000195_rule
Checks: C-SRG-NET-000132-IDPS-000195_chk
Verify the IDPS is configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. If the IDPS is not configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-SRG-NET-000132-IDPS-000195_fix
Configure the IDPS to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-NET-000228-IDPS-000196
- Vuln IDs
-
- SRG-NET-000228-IDPS-000196
- Rule IDs
-
- SRG-NET-000228-IDPS-000196_rule
Checks: C-SRG-NET-000228-IDPS-000196_chk
Verify the IDPS detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. If the IDPS does not detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment, this is a finding.
Fix: F-SRG-NET-000228-IDPS-000196_fix
Configure the IDPS to detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or are prohibited for use based on a risk assessment.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- SRG-NET-000229-IDPS-000163
- Vuln IDs
-
- SRG-NET-000229-IDPS-000163
- Rule IDs
-
- SRG-NET-000229-IDPS-000163_rule
Checks: C-SRG-NET-000229-IDPS-000163_chk
Verify the IDPS blocks any prohibited mobile code at the enclave boundary when it is detected. If the IDPS does not block any prohibited mobile code at the enclave boundary when it is detected, this is a finding.
Fix: F-SRG-NET-000229-IDPS-000163_fix
Configure the IDPS to block any prohibited mobile code at the enclave boundary when it is detected.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-IDPS-000169
- Vuln IDs
-
- SRG-NET-000235-IDPS-000169
- Rule IDs
-
- SRG-NET-000235-IDPS-000169_rule
Checks: C-SRG-NET-000235-IDPS-000169_chk
Verify the IDPS stops forwarding traffic or maintains the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort. If the IDPS does not stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort, this is a finding.
Fix: F-SRG-NET-000235-IDPS-000169_fix
Configure the IDPS to stop forwarding traffic or maintain the configured security policies upon the failure of the following actions: system initialization, shutdown, or system abort.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-IDPS-000170
- Vuln IDs
-
- SRG-NET-000236-IDPS-000170
- Rule IDs
-
- SRG-NET-000236-IDPS-000170_rule
Checks: C-SRG-NET-000236-IDPS-000170_chk
Verify the IDPS, upon system failure, saves diagnostic information, logs system messages, and loads the most current security policies, rules, and signatures when restarted. If the device does not, upon system failure, save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-SRG-NET-000236-IDPS-000170_fix
Configure the IDPS to, upon system failure, save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-IDPS-000196
- Vuln IDs
-
- SRG-NET-000362-IDPS-000196
- Rule IDs
-
- SRG-NET-000362-IDPS-000196_rule
Checks: C-SRG-NET-000362-IDPS-000196_chk
Verify the IDPS protects against or limits the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis. If the device does not protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.
Fix: F-SRG-NET-000362-IDPS-000196_fix
Configure the IDPS to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-IDPS-000197
- Vuln IDs
-
- SRG-NET-000362-IDPS-000197
- Rule IDs
-
- SRG-NET-000362-IDPS-000197_rule
Checks: C-SRG-NET-000362-IDPS-000197_chk
Verify the IDPS protect against or limits the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors. If the device does not protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors, this is a finding.
Fix: F-SRG-NET-000362-IDPS-000197_fix
Configure the IDPS to protect against or limit the effects of known and unknown types of DoS attacks by employing pattern recognition pre-processors.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-IDPS-000198
- Vuln IDs
-
- SRG-NET-000362-IDPS-000198
- Rule IDs
-
- SRG-NET-000362-IDPS-000198_rule
Checks: C-SRG-NET-000362-IDPS-000198_chk
Verify the IDPS protects against or limits the effects of known types of DoS attacks by employing signatures. If the device does not protect against or limit the effects of known types of DoS attacks by employing signatures, this is a finding.
Fix: F-SRG-NET-000362-IDPS-000198_fix
Configure the IDPS to protect against or limit the effects of known types of DoS attacks by employing signatures.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000192-IDPS-000140
- Vuln IDs
-
- SRG-NET-000192-IDPS-000140
- Rule IDs
-
- SRG-NET-000192-IDPS-000140_rule
Checks: C-SRG-NET-000192-IDPS-000140_chk
Verify the IDPS protects against the use of internal information systems to launch Denial of Service (DoS) attacks against other networks or endpoints by preventing outbound traffic containing known and unknown DoS attacks. If the IDPS does not protect against the use of internal information systems to launch Denial of Service (DoS) attacks against other networks or endpoints by preventing outbound traffic containing known and unknown DoS attacks, this is a finding.
Fix: F-SRG-NET-000192-IDPS-000140_fix
Configure the IDPS to protect against the use of internal information systems to launch Denial of Service (DoS) attacks against other networks or endpoints by preventing outbound traffic containing known and unknown DoS attacks.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001126
- Version
- SRG-NET-000365-IDPS-000199
- Vuln IDs
-
- SRG-NET-000365-IDPS-000199
- Rule IDs
-
- SRG-NET-000365-IDPS-000199_rule
Checks: C-SRG-NET-000365-IDPS-000199_chk
Verify the IDPS fails securely in the event of an operational failure. If the IDPS does not fail securely in the event of an operational failure, this is a finding.
Fix: F-SRG-NET-000365-IDPS-000199_fix
Configure the IDPS to fail securely in the event of an operational failure.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-NET-000401-IDPS-000203
- Vuln IDs
-
- SRG-NET-000401-IDPS-000203
- Rule IDs
-
- SRG-NET-000401-IDPS-000203_rule
Checks: C-SRG-NET-000401-IDPS-000203_chk
Verify the IDPS, for fragmented packets, either the packets or properly reassemble the packets before inspecting and forwarding. For fragmented packets, if the IDPS does not either the packets or properly reassemble the packets before inspecting and forwarding, this is a finding.
Fix: F-SRG-NET-000401-IDPS-000203_fix
Configure the IDPS to for fragmented packets, either the packets or properly reassemble the packets before inspecting and forwarding.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000273-IDPS-000198
- Vuln IDs
-
- SRG-NET-000273-IDPS-000198
- Rule IDs
-
- SRG-NET-000273-IDPS-000198_rule
Checks: C-SRG-NET-000273-IDPS-000198_chk
Verify the IDPS blocks outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. If the IDPS does not block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages, this is a finding.
Fix: F-SRG-NET-000273-IDPS-000198_fix
Configure the IDPS to block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. An acceptable alternative to blocking all Destination Unreachable responses is to filter Destination Unreachable messages generated by the firewall implementation to allow ICMP Destination Unreachable—Fragmentation Needed but DF Bit Set (Type 3, Code 4) and apply this filter to the external interfaces.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000273-IDPS-000204
- Vuln IDs
-
- SRG-NET-000273-IDPS-000204
- Rule IDs
-
- SRG-NET-000273-IDPS-000204_rule
Checks: C-SRG-NET-000273-IDPS-000204_chk
Verify the IDPS blocks malicious ICMP packets by properly configuring ICMP signatures and rules. If the IDPS does not block malicious ICMP packets by properly configuring ICMP signatures and rules, this is a finding.
Fix: F-SRG-NET-000273-IDPS-000204_fix
Configure the IDPS to block malicious ICMP packets by properly configuring ICMP signatures and rules.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001247
- Version
- SRG-NET-000251-IDPS-000178
- Vuln IDs
-
- SRG-NET-000251-IDPS-000178
- Rule IDs
-
- SRG-NET-000251-IDPS-000178_rule
Checks: C-SRG-NET-000251-IDPS-000178_chk
Verify the IDPS automatically installs updates to signature definitions, detection heuristics, and vendor-provided rules. If the IDPS does not install updates to signature definitions, detection heuristics, and vendor-provided rules, this is a finding.
Fix: F-SRG-NET-000251-IDPS-000178_fix
Configure the IDPS to install updates to signature definitions, detection heuristics, and vendor-provided rules.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001240
- Version
- SRG-NET-000246-IDPS-000205
- Vuln IDs
-
- SRG-NET-000246-IDPS-000205
- Rule IDs
-
- SRG-NET-000246-IDPS-000205_rule
Checks: C-SRG-NET-000246-IDPS-000205_chk
Verify the IDPS installs updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures. If the IDPS does not install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.
Fix: F-SRG-NET-000246-IDPS-000205_fix
Configure the IDPS to install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001240
- Version
- SRG-NET-000246-IDPS-000175
- Vuln IDs
-
- SRG-NET-000246-IDPS-000175
- Rule IDs
-
- SRG-NET-000246-IDPS-000175_rule
Checks: C-SRG-NET-000246-IDPS-000175_chk
Verify the IDPS verifies the integrity of updates obtained directly from the vendor. If the IDPS does not verify the integrity of updates obtained directly from the vendor, this is a finding.
Fix: F-SRG-NET-000246-IDPS-000175_fix
Configure the IDPS to verify the integrity of updates obtained directly from the vendor.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- SRG-NET-000248-IDPS-000206
- Vuln IDs
-
- SRG-NET-000248-IDPS-000206
- Rule IDs
-
- SRG-NET-000248-IDPS-000206_rule
Checks: C-SRG-NET-000248-IDPS-000206_chk
Verify the IDPS performs real-time monitoring of files from external sources at network entry/exit points. If the IDPS does not perform real-time monitoring of files from external sources at network entry/exit points, this is a finding.
Fix: F-SRG-NET-000248-IDPS-000206_fix
Configure the IDPS to perform real-time monitoring of files from external sources at network entry/exit points.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-IDPS-000176
- Vuln IDs
-
- SRG-NET-000249-IDPS-000176
- Rule IDs
-
- SRG-NET-000249-IDPS-000176_rule
Checks: C-SRG-NET-000249-IDPS-000176_chk
Verify the IDPS blocks and either deletes or quarantines malicious code. If the IDPS does not block and either delete or quarantine malicious code, this is a finding.
Fix: F-SRG-NET-000249-IDPS-000176_fix
Configure the IDPS to block and either delete or quarantine malicious code.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-IDPS-000207
- Vuln IDs
-
- SRG-NET-000249-IDPS-000207
- Rule IDs
-
- SRG-NET-000249-IDPS-000207_rule
Checks: C-SRG-NET-000249-IDPS-000207_chk
Verify the IDPS generates an alert, at a minimum, to the SA when malicious code is detected. If the IDPS does not generate an alert, at a minimum, to the SA when malicious code is detected, this is a finding.
Fix: F-SRG-NET-000249-IDPS-000207_fix
Configure the IDPS to generate an alert, at a minimum, to the SA when malicious code is detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002656
- Version
- SRG-NET-000383-IDPS-000208
- Vuln IDs
-
- SRG-NET-000383-IDPS-000208
- Rule IDs
-
- SRG-NET-000383-IDPS-000208_rule
Checks: C-SRG-NET-000383-IDPS-000208_chk
Verify the IDPS integrates with a network-wide monitoring capability which includes sensors, event databases, and management consoles. If the IDPS does not integrate with a network-wide monitoring capability which includes sensors, event databases, and management consoles, this is a finding.
Fix: F-SRG-NET-000383-IDPS-000208_fix
Configure the IDPS to perform real-time monitoring of files from external sources at network entry/exit points as they are downloaded and prior to being opened or executed.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002683
- Version
- SRG-NET-000384-IDPS-000209
- Vuln IDs
-
- SRG-NET-000384-IDPS-000209
- Rule IDs
-
- SRG-NET-000384-IDPS-000209_rule
Checks: C-SRG-NET-000384-IDPS-000209_chk
Verify the IDPS detects network services that have not been authorized or approved by the IAM/IAO, at a minimum. If the IDPS does not detect network services that have not been authorized or approved by the IAM/IAO, at a minimum, this is a finding.
Fix: F-SRG-NET-000384-IDPS-000209_fix
Configure the IDPS to detect network services that have not been authorized or approved by the IAM/IAO, at a minimum.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-IDPS-000210
- Vuln IDs
-
- SRG-NET-000385-IDPS-000210
- Rule IDs
-
- SRG-NET-000385-IDPS-000210_rule
Checks: C-SRG-NET-000385-IDPS-000210_chk
Verify the IDPS generates a log record when unauthorized network services are detected. If the IDPS does not generate a log record when unauthorized network services are detected, this is a finding.
Fix: F-SRG-NET-000385-IDPS-000210_fix
Configure the IDPS to generate a log record when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-IDPS-000211
- Vuln IDs
-
- SRG-NET-000385-IDPS-000211
- Rule IDs
-
- SRG-NET-000385-IDPS-000211_rule
Checks: C-SRG-NET-000385-IDPS-000211_chk
Verify the IDPS generates an alert to the IAO, IAM, and other individuals designated by the local organization when unauthorized network services are detected. If the IDPS does not generate an alert to the IAO, IAM, and other individuals designated by the local organization when unauthorized network services are detected, this is a finding.
Fix: F-SRG-NET-000385-IDPS-000211_fix
Configure the IDPS to generate an alert to the IAO, IAM, and other individuals designated by the local organization when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002661
- Version
- SRG-NET-000390-IDPS-000212
- Vuln IDs
-
- SRG-NET-000390-IDPS-000212
- Rule IDs
-
- SRG-NET-000390-IDPS-000212_rule
Checks: C-SRG-NET-000390-IDPS-000212_chk
Verify the IDPS continuously monitors inbound communications traffic for unusual/unauthorized activities or conditions. If the IDPS does not continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions, this is a finding.
Fix: F-SRG-NET-000390-IDPS-000212_fix
Configure the IDPS to continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002662
- Version
- SRG-NET-000391-IDPS-000213
- Vuln IDs
-
- SRG-NET-000391-IDPS-000213
- Rule IDs
-
- SRG-NET-000391-IDPS-000213_rule
Checks: C-SRG-NET-000391-IDPS-000213_chk
Verify the IDPS continuously monitors outbound communications traffic for unusual/unauthorized activities or conditions. If the IDPS does not continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions, this is a finding.
Fix: F-SRG-NET-000391-IDPS-000213_fix
Configure the IDPS to continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-000214
- Vuln IDs
-
- SRG-NET-000392-IDPS-000214
- Rule IDs
-
- SRG-NET-000392-IDPS-000214_rule
Checks: C-SRG-NET-000392-IDPS-000214_chk
Verify the IDPS generates an alert to IAO, IAM, and other individuals designated by the local organization when real-time monitoring of communications traffic from external sources occurs. If the IDPS does not generate an alert to the IAO, IAM, and other individuals designated by the local organization when real-time monitoring of communications traffic from external sources occurs, this is a finding.
Fix: F-SRG-NET-000392-IDPS-000214_fix
Configure the IDPS to generate an alert to IAO, IAM, and other individuals designated by the local organization when real-time monitoring of communications traffic from external sources occurs.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-000215
- Vuln IDs
-
- SRG-NET-000392-IDPS-000215
- Rule IDs
-
- SRG-NET-000392-IDPS-000215_rule
Checks: C-SRG-NET-000392-IDPS-000215_chk
Verify the IDPS generates an alert to IAO, IAM, and other individuals designated by the local organization when threats identified by authoritative sources (e.g., IAVMs, CTOs) are detected. If the IDPS does not generate an alert to IAO, IAM, and other individuals designated by the local organization when threats identified by authoritative sources (e.g., IAVMs, CTOs) are detected, this is a finding.
Fix: F-SRG-NET-000392-IDPS-000215_fix
Configure the IDPS to generate an alert to IAO, IAM, and other individuals designated by the local organization when threats identified by authoritative sources (e.g., IAVMs, CTOs) are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-000216
- Vuln IDs
-
- SRG-NET-000392-IDPS-000216
- Rule IDs
-
- SRG-NET-000392-IDPS-000216_rule
Checks: C-SRG-NET-000392-IDPS-000216_chk
Verify the IDPS generates an alert to IAO, IAM, and other individuals designated by the local organization when Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B occur. If the IDPS does not generate an alert to IAO, IAM, and other individuals designated by the local organization when Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B occur, this is a finding.
Fix: F-SRG-NET-000392-IDPS-000216_fix
Configure the IDPS to generate an alert to IAO, IAM, and other individuals designated by the local organization when Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B occur.