Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify the IDPS enforces approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network as defined in the PPSM CAL and vulnerability assessments. If the IDPS does not enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Configure the IDPS to enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network as defined in the PPSM CAL and vulnerability assessments.
Verify the IDPS enforces approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks as defined in the PPSM CAL and vulnerability assessments. If the IDPS does not enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Configure the IDPS to enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks as defined in the PPSM CAL and vulnerability assessments.
Verify the IDPS immediately uses updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions. If the IDPS does not immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms to traffic detection and prevention functions, this is a finding.
Configure the IDPS to immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions.
Verify the entries sent to the audit log include, at a minimum, event descriptions, policy filter, rule or signature invoked, port, protocol, criticality level/alert code or description. If the audit log event records does not include, at a minimum, event descriptions, policy filter, rule signature invoked, port, protocol, and criticality level/alert code or description, this is a finding.
Configure the IDPS components to ensure entries sent to the audit log include sufficient information to determine the type or category for each audit event recorded in the audit log, including, at a minimum, event descriptions, policy filter, rule or signature invoked, port, protocol, and criticality level/alert code or description.
Verify the entries sent to the audit log include the date and time of each event. If the audit log event records do not include the date and time the events occurred, this is a finding.
Configure the IDPS components to include the date time stamp of events in log messages.
Verify the IDPS produces audit records containing information to establish where the event was detected, including, at a minimum, network segment, destination address, and IDPS component which detected the event. If the audit log events do not include information which establishes where the event was detected, including, at a minimum, network segment, destination address, and IDPS component which detected the event, this is a finding.
Configure the IDPS to produce audit records containing information to establish where the event was detected, including, at a minimum, network segment, destination address, and IDPS component which detected the event.
Verify configuration produces audit records containing information to establish the source of the event, including, at a minimum, originating source address. If the IDPS does not produce audit records containing information to establish the source of the event, including, at a minimum, originating source address, this is a finding.
Configure the IDPS to produce audit records containing information to establish the source of the event, including, at a minimum, originating source address.
Verify the entries sent to the audit log include, at a minimum, capturing all associated communications traffic. If the audit log event records do not include, at a minimum, capturing all associated communications traffic, this is a finding.
Configure the IDPS components to ensure entries sent to the audit log include, at a minimum, capturing all associated communications traffic.
Verify the IDPS, in the event of a logging failure caused by loss of communications with the central logging server, queues audit records locally until communication is restored or until the audit records are retrieved manually or using automated synchronization tools. In the event of a logging failure caused by loss of communications with the central logging server, if the IDPS does not queue audit records locally until communication is restored or until the audit records are retrieved manually or using automated synchronization tools, this is a finding.
Configure the IDPS, in the event of a logging failure caused by loss of communications with the central logging server, to queue audit records locally until communication is restored or until the audit records are retrieved manually or using automated synchronization tools.
Verify the IDPS, in the event of a logging failure caused by the lack of audit record storage capacity, continues generating and storing audit records and overwriting the oldest audit records in a first-in-first-out manner. In the event of a logging failure caused by the lack of audit record storage capacity, if the IDPS does not continue generating and storing audit records and overwriting the oldest audit records in a first-in-first-out manner, this is a finding.
Configure the IDPS to, in the event of a logging failure caused by the lack of audit record storage capacity, continue generating and storing audit records and overwriting the oldest audit records in a first-in-first-out manner.
Verify the IDPS provides log information in a format that can be extracted and used by centralized analysis tools. If the IDPS does not provide log information in a format that can be extracted and used by centralized analysis tools, this is a finding.
Configure the IDPS to provide log information in a format that can be extracted and used by centralized analysis tools.
Verify the configuration provides audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis. If the IDPS does not provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis, this is a finding.
Configure the IDPS to provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
Verify the configuration provides audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis algorithms. If the IDPS does not provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis, this is a finding.
Configure the IDPS to provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis algorithms.
Verify the configuration provides audit record generation with a configurable severity and escalation level capability. If the IDPS does not provide audit record generation with a configurable severity and escalation level capability, this is a finding.
Configure the IDPS to provide audit record generation with a configurable severity and escalation level capability.
Have the SCA display the services running on the IDPS components. Review the IDPS configuration to determine if non-essential capabilities not required for operation, or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If the IDPS is not configured to remove or disable non-essential capabilities which are not required for operation or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server), this is a finding.
Remove or disable non-essential capabilities from the IDPS. Removal is recommended since the service or function may be inadvertently enabled. However, if removal is not possible, disable the service or function. Document all necessary services.
Verify the IDPS is configured to remove or disable non-essential features, functions, and services of the IDPS application. If the IDPS is not configured to remove or disable non-essential features, functions, and services of the IDPS application, this is a finding.
Configure the IDPS to remove or disable non-essential features, functions, and services of the IDPS application.
Verify the IDPS is configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. If the IDPS is not configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Configure the IDPS to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
Verify the IDPS blocks outbound traffic containing known and unknown DoS attacks by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic. If the IDPS does not block outbound traffic containing known and unknown DoS attacks, by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic, this is a finding.
Configure the IDPS to block outbound traffic containing known and unknown DoS attacks, by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic.
Verify the IDPS detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. If the IDPS does not detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment, this is a finding.
Configure the IDPS to detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or are prohibited for use based on a risk assessment.
Verify the IDPS blocks any prohibited mobile code at the enclave boundary when it is detected. If the IDPS does not block any prohibited mobile code at the enclave boundary when it is detected, this is a finding.
Configure the IDPS to block any prohibited mobile code at the enclave boundary when it is detected.
Verify the IDPS fails to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation. If the IDPS does not fail to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation, this is a finding.
Configure the IDPS to fail to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation.
Verify the IDPS, upon failure of the IDPS function, saves diagnostic information, logs system messages, and loads the most current security policies, rules, and signatures when restarted. If IDPS function, upon system failure, does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Configure the IDPS to, upon failure of the IDPS function, save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
Verify the IDPS installs updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures. If the IDPS does not install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.
Configure the IDPS to install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.
Verify the IDPS performs real-time monitoring of files from external sources at network entry/exit points. If the IDPS does not perform real-time monitoring of files from external sources at network entry/exit points, this is a finding.
Configure the IDPS to perform real-time monitoring of files from external sources at network entry/exit points.
Verify the IDPS blocks malicious code. If the IDPS does not block malicious code, this is a finding.
Configure the IDPS to block malicious code.
Verify the IDPS quarantines and/or delete malicious code. If the IDPS does not quarantine and/or delete malicious code, this is a finding.
Configure the IDPS to quarantine and/or delete malicious code.
Verify the IDPS sends an immediate (within seconds) alert to, at a minimum, the system administrator when malicious code is detected. If the IDPS does not send an immediate (within seconds) alert to, at a minimum, the system administrator when malicious code is detected, this is a finding.
Configure the IDPS to send an immediate (within seconds) alert to, at a minimum, the system administrator when malicious code is detected.
Verify the IDPS automatically installs updates to signature definitions, detection heuristics, and vendor-provided rules. If the IDPS does not automatically install updates to signature definitions, detection heuristics, and vendor-provided rules, this is a finding.
Configure the IDPS to automatically install updates to signature definitions, detection heuristics, and vendor-provided rules.
Verify the IDPS blocks outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. If the IDPS does not block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages, this is a finding.
Configure the IDPS to block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. An acceptable alternative to blocking all Destination Unreachable responses is to filter Destination Unreachable messages generated by the firewall implementation to allow ICMP Destination Unreachable-- Fragmentation Needed but DF Bit Set (Type 3, Code 4) and apply this filter to the external interfaces.
Verify the IDPS blocks malicious ICMP packets by properly configuring ICMP signatures and rules. If the IDPS does not block malicious ICMP packets by properly configuring ICMP signatures and rules, this is a finding.
Configure the IDPS to block malicious ICMP packets by properly configuring ICMP signatures and rules.
Verify the IDPS prevents code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the IDPS does not prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Configure the IDPS components to prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
Verify the IDPS prevents code injection attacks launched against application objects including, at a minimum, application URLs and application code. If the IDPS does not prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Configure the IDPS to prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
Verify the IDPS prevents SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the IDPS does not prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Configure the IDPS to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
Verify the IDPS detects code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the IDPS does not detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Configure the IDPS components to detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
Verify the IDPS detects code injection attacks launched against application objects including, at a minimum, application URLs and application code. If the IDPS does not detect code injection attacks launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Configure the IDPS to detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
Verify the IDPS detects SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the IDPS does not detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Configure the IDPS to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
Verify the IDPS off-loads log records to a centralized log server. If the IDPS does not off-load log records to a centralized log server, this is a finding.
Configure the IDPS to off-load log records to a centralized log server.
Verify the IDPS provides an alert to, at a minimum, the system administrator and ISSO when any audit failure events occur. If the IDPS does not provide an alert to, at a minimum, the system administrator and ISSO when any audit failure events occur, this is a finding.
Configure the IDPS to provide an alert to, at a minimum, the system administrator and ISSO when any audit failure events occur.
Verify the IDPS provides assign a critical severity level to all audit processing failures. If the IDPS does not assign a critical severity level to all audit processing failures, this is a finding.
Configure the IDPS to assign a critical severity level to all audit processing failures.
Verify the IDPS protects against or limits the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis. If the device does not protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.
Configure the IDPS to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.
Verify the IDPS protect against or limits the effects of known and unknown types of DoS attacks by employing, also known as anomaly-based detection. If the device does not protect against or limit the effects of known and unknown types of DoS attacks by employing anomaly-based detection, this is a finding.
Configure the IDPS to protect against or limit the effects of known and unknown types of DoS attacks by employing anomaly-based detection.
Verify the IDPS protects against or limits the effects of known types of DoS attacks by employing signatures. If the device does not protect against or limit the effects of known types of DoS attacks by employing signatures, this is a finding.
Configure the IDPS to protect against or limit the effects of known types of DoS attacks by employing signatures.
Verify the IDPS integrates with a network-wide monitoring capability which includes sensors, event databases, and management consoles. If the IDPS does not integrate with a network-wide monitoring capability which includes sensors, event databases, and management consoles, this is a finding.
Configure the IDPS components, including sensors, event databases, and management consoles to integrate with a network-wide monitoring capability.
Verify the IDPS detects network services that have not been authorized or approved by the ISSO or ISSM, at a minimum. If the IDPS does not detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum, this is a finding.
Configure the IDPS to detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum.
Verify the IDPS generates a log record when unauthorized network services are detected. If the IDPS does not generate a log record when unauthorized network services are detected, this is a finding.
Configure the IDPS to generate a log record when unauthorized network services are detected.
Verify the IDPS generates an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected. If the IDPS does not generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected, this is a finding.
Configure the IDPS to generate an alert to the ISSM and ISSo, at a minimum, when unauthorized network services are detected.
Verify the IDPS continuously monitors inbound communications traffic for unusual/unauthorized activities or conditions. If the IDPS does not continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions, this is a finding.
Configure the IDPS to continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.
Verify the IDPS continuously monitors outbound communications traffic for unusual/unauthorized activities or conditions. If the IDPS does not continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions, this is a finding.
Configure the IDPS to continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when intrusion detection events are detected which indicate a compromise or potential for compromise. If the IDPS does not send an alert to, at a minimum, the ISSO and ISSM when intrusion detection events are detected which indicate a compromise or potential for compromise, this is a finding.
Configure the IDPS to send an alert to, at a minimum, the ISSO and ISSM when intrusion detection events are detected which indicate a compromise or potential for compromise.
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise, this is a finding.
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise.
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when root level intrusion events which provide unauthorized privileged access are detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events which provide unauthorized privileged access are detected, this is a finding.
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events which provide unauthorized privileged access are detected.
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when user level intrusions which provide non-privileged access are detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events when user level intrusions which provide non-privileged access are detected, this is a finding.
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when user level intrusions which provide non-privileged access are detected.
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when denial of service incidents are detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events when denial of service incidents are detected, this is a finding.
Configure the IDPS to send an alert to, at a minimum, the IAM and IAO when denial of service incidents are detected.
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected, this is a finding.
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
Verify the IDPS, for fragmented packets, either blocks the packets or properly reassembles the packets before inspecting and forwarding. For fragmented packets, if the IDPS does not either block the packets or properly reassemble the packets before inspecting and forwarding, this is a finding.
Configure the IDPS to, for fragmented packets, either block the packets or properly reassemble the packets before inspecting and forwarding.
Verify the IDPS off-loads log records to a centralized log server in real-time. If the IDPS does not off-load log records to a centralized log server in real-time, this is a finding.
Configure the IDPS to off-load log records to a centralized log server in real-time.
Verify the IDPS is configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. If the IDPS is not configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices, this is a finding.
Configure the IDPS to comply with the security configuration settings based on DoD security policy and technology-specific security best practices.
Verify the IDPS is configured to employ organization-defined controls by type of DoS to achieve the denial-of-service objective. If the IDPS is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Configure the IDPS to employ organization-defined controls by type of DoS to achieve the DoS objective.
Verify the IDPS is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the IDPS is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Configure the IDPS to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
Verify the IDPS is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the IDPS is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Configure the IDPS to establish organization-defined alternate communications paths for system operations organizational command and control.