Intrusion Detection and Prevention Systems Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +2 ✎ 16
Comparison against the immediately-prior release (V3R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 2
- V-278978 Medium The IDPS must use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
- V-278979 Medium The IDPS must provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices.
Content changes 16
- V-206864 Medium descriptioncheckfix The IPS must enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network.
- V-206865 Medium descriptioncheckfix The IPS must restrict or block harmful or suspicious communications traffic between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.
- V-206866 Medium description The IDPS must immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions.
- V-206881 Medium descriptioncheckfix The IPS must block outbound traffic containing known and unknown denial-of-service (DoS) attacks by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic.
- V-206883 Medium descriptioncheckfix The IPS must block any prohibited mobile code at the enclave boundary when it is detected.
- V-206889 Medium descriptioncheckfix The IPS must block malicious code.
- V-206890 Medium descriptioncheckfix The IPS must quarantine or block malicious code.
- V-206893 Medium descriptioncheckfix The IPS must block outbound Internet Control Message Protocol (ICMP) Destination Unreachable, Redirect, and Address Mask reply messages.
- V-206894 Medium descriptioncheckfix The IPS must block malicious Internet Control Message Protocol (ICMP) packets by properly configuring ICMP signatures and rules.
- V-206895 Medium descriptioncheckfix To protect against unauthorized data mining, the IPS must prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- V-206896 Medium descriptioncheckfix To protect against unauthorized data mining, the IPS must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
- V-206897 Medium descriptioncheckfix To protect against unauthorized data mining, the IPS must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- V-206905 Medium descriptioncheckfix The IPS must protect against or limit the effects of known and unknown types of denial-of-service (DoS) attacks by employing rate-based attack prevention behavior analysis.
- V-206906 Medium descriptioncheckfix The IPS must protect against or limit the effects of known and unknown types of denial-of-service (DoS) attacks by employing anomaly-based attack detection.
- V-206907 Medium descriptioncheckfix The IPS must protect against or limit the effects of known types of denial-of-service (DoS) attacks by employing signatures.
- V-263664 Medium description The IDPS must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-NET-000018-IDPS-00018
- Vuln IDs
-
- V-206864
- V-34484
- Rule IDs
-
- SV-206864r1137714_rule
- SV-45260
Checks: C-7118r1137712_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS enforces approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network. If the IPS does not enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network, this is a finding.
Fix: F-7118r1137713_fix
Configure the IPS to enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic within the network.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-IDPS-00019
- Vuln IDs
-
- V-206865
- V-34485
- Rule IDs
-
- SV-206865r1137717_rule
- SV-45262
Checks: C-7119r1137715_chk
If the device being reviews is an IDS, this is not applicable. Verify the IPS enforces approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks. If the IPS does not enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks, this is a finding.
Fix: F-7119r1137716_fix
Configure the IPS to enforce approved authorizations by restricting or blocking the flow of harmful or suspicious communications traffic for controlling the flow of information between interconnected networks.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-IDPS-00187
- Vuln IDs
-
- V-206866
- V-55317
- Rule IDs
-
- SV-206866r1137718_rule
- SV-69563
Checks: C-7120r298110_chk
Verify the IDPS immediately uses updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions. If the IDPS does not immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms to traffic detection and prevention functions, this is a finding.
Fix: F-7120r298111_fix
Configure the IDPS to immediately use updates made to policy filters, rules, signatures, and anomaly analysis algorithms for traffic detection and prevention functions.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-NET-000074-IDPS-00059
- Vuln IDs
-
- V-206867
- V-34540
- Rule IDs
-
- SV-206867r382855_rule
- SV-45382
Checks: C-7121r298113_chk
Verify the entries sent to the audit log include, at a minimum, event descriptions, policy filter, rule or signature invoked, port, protocol, criticality level/alert code or description. If the audit log event records does not include, at a minimum, event descriptions, policy filter, rule signature invoked, port, protocol, and criticality level/alert code or description, this is a finding.
Fix: F-7121r298114_fix
Configure the IDPS components to ensure entries sent to the audit log include sufficient information to determine the type or category for each audit event recorded in the audit log, including, at a minimum, event descriptions, policy filter, rule or signature invoked, port, protocol, and criticality level/alert code or description.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-NET-000075-IDPS-00060
- Vuln IDs
-
- V-206868
- V-34541
- Rule IDs
-
- SV-206868r382858_rule
- SV-45383
Checks: C-7122r298116_chk
Verify the entries sent to the audit log include the date and time of each event. If the audit log event records do not include the date and time the events occurred, this is a finding.
Fix: F-7122r298117_fix
Configure the IDPS components to include the date time stamp of events in log messages.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000076-IDPS-00061
- Vuln IDs
-
- V-206869
- V-34542
- Rule IDs
-
- SV-206869r382861_rule
- SV-45384
Checks: C-7123r298119_chk
Verify the IDPS produces audit records containing information to establish where the event was detected, including, at a minimum, network segment, destination address, and IDPS component which detected the event. If the audit log events do not include information which establishes where the event was detected, including, at a minimum, network segment, destination address, and IDPS component which detected the event, this is a finding.
Fix: F-7123r298120_fix
Configure the IDPS to produce audit records containing information to establish where the event was detected, including, at a minimum, network segment, destination address, and IDPS component which detected the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-NET-000077-IDPS-00062
- Vuln IDs
-
- V-206870
- V-34543
- Rule IDs
-
- SV-206870r382864_rule
- SV-45385
Checks: C-7124r298122_chk
Verify configuration produces audit records containing information to establish the source of the event, including, at a minimum, originating source address. If the IDPS does not produce audit records containing information to establish the source of the event, including, at a minimum, originating source address, this is a finding.
Fix: F-7124r298123_fix
Configure the IDPS to produce audit records containing information to establish the source of the event, including, at a minimum, originating source address.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000078-IDPS-00063
- Vuln IDs
-
- V-206871
- V-34544
- Rule IDs
-
- SV-206871r382867_rule
- SV-45386
Checks: C-7125r298125_chk
Verify the entries sent to the audit log include, at a minimum, capturing all associated communications traffic. If the audit log event records do not include, at a minimum, capturing all associated communications traffic, this is a finding.
Fix: F-7125r298126_fix
Configure the IDPS components to ensure entries sent to the audit log include, at a minimum, capturing all associated communications traffic.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-NET-000091-IDPS-00193
- Vuln IDs
-
- V-206874
- V-55335
- Rule IDs
-
- SV-206874r382879_rule
- SV-69581
Checks: C-7128r298134_chk
Verify the IDPS provides log information in a format that can be extracted and used by centralized analysis tools. If the IDPS does not provide log information in a format that can be extracted and used by centralized analysis tools, this is a finding.
Fix: F-7128r298135_fix
Configure the IDPS to provide log information in a format that can be extracted and used by centralized analysis tools.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-IDPS-00013
- Vuln IDs
-
- V-206875
- V-55319
- Rule IDs
-
- SV-206875r382900_rule
- SV-69565
Checks: C-7129r298137_chk
Verify the configuration provides audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis. If the IDPS does not provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis, this is a finding.
Fix: F-7129r298138_fix
Configure the IDPS to provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-IDPS-00082
- Vuln IDs
-
- V-206876
- V-34594
- Rule IDs
-
- SV-206876r382900_rule
- SV-45458
Checks: C-7130r298140_chk
Verify the configuration provides audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis algorithms. If the IDPS does not provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis, this is a finding.
Fix: F-7130r298141_fix
Configure the IDPS to provide audit record generation capability for events where communication traffic is blocked or restricted based on policy filters, rules, signatures, and anomaly analysis algorithms.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-NET-000113-IDPS-00189
- Vuln IDs
-
- V-206877
- V-55321
- Rule IDs
-
- SV-206877r382900_rule
- SV-69567
Checks: C-7131r298143_chk
Verify the configuration provides audit record generation with a configurable severity and escalation level capability. If the IDPS does not provide audit record generation with a configurable severity and escalation level capability, this is a finding.
Fix: F-7131r298144_fix
Configure the IDPS to provide audit record generation with a configurable severity and escalation level capability.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-IDPS-00011
- Vuln IDs
-
- V-206878
- V-55339
- Rule IDs
-
- SV-206878r382903_rule
- SV-69585
Checks: C-7132r298146_chk
Have the SCA display the services running on the IDPS components. Review the IDPS configuration to determine if non-essential capabilities not required for operation, or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server) are enabled. If the IDPS is not configured to remove or disable non-essential capabilities which are not required for operation or not related to IDPS functionality (e.g., DNS, email client or server, FTP server, or web server), this is a finding.
Fix: F-7132r298147_fix
Remove or disable non-essential capabilities from the IDPS. Removal is recommended since the service or function may be inadvertently enabled. However, if removal is not possible, disable the service or function. Document all necessary services.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-NET-000131-IDPS-00097
- Vuln IDs
-
- V-206879
- V-34625
- Rule IDs
-
- SV-206879r382903_rule
- SV-45500
Checks: C-7133r298149_chk
Verify the IDPS is configured to remove or disable non-essential features, functions, and services of the IDPS application. If the IDPS is not configured to remove or disable non-essential features, functions, and services of the IDPS application, this is a finding.
Fix: F-7133r298150_fix
Configure the IDPS to remove or disable non-essential features, functions, and services of the IDPS application.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-IDPS-00195
- Vuln IDs
-
- V-206880
- V-55341
- Rule IDs
-
- SV-206880r552959_rule
- SV-69587
Checks: C-7134r298152_chk
Verify the IDPS is configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. If the IDPS is not configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix: F-7134r298153_fix
Configure the IDPS to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-NET-000192-IDPS-00140
- Vuln IDs
-
- V-206881
- V-34707
- Rule IDs
-
- SV-206881r1140706_rule
- SV-45593
Checks: C-7135r1137726_chk
If the device being reviews is an IDS, this is not applicable. Verify the IPS blocks outbound traffic containing known and unknown DoS attacks by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic. If the IPS does not block outbound traffic containing known and unknown DoS attacks, by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic, this is a finding.
Fix: F-7135r1137727_fix
Configure the IPS to block outbound traffic containing known and unknown DoS attacks, by ensuring that security policies, signatures, rules, and anomaly detection techniques are applied to outbound communications traffic.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-NET-000228-IDPS-00196
- Vuln IDs
-
- V-206882
- V-55343
- Rule IDs
-
- SV-206882r383101_rule
- SV-69589
Checks: C-7136r298158_chk
Verify the IDPS detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment. If the IDPS does not detect, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or is prohibited for use based on a risk assessment, this is a finding.
Fix: F-7136r298159_fix
Configure the IDPS to detects, at a minimum, mobile code that is unsigned or exhibiting unusual behavior, has not undergone a risk assessment, or are prohibited for use based on a risk assessment.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- SRG-NET-000229-IDPS-00163
- Vuln IDs
-
- V-206883
- V-34743
- Rule IDs
-
- SV-206883r1137731_rule
- SV-45652
Checks: C-7137r1137729_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS blocks any prohibited mobile code at the enclave boundary when it is detected. If the IPS does not block any prohibited mobile code at the enclave boundary when it is detected, this is a finding.
Fix: F-7137r1137730_fix
Configure the IPS to block any prohibited mobile code at the enclave boundary when it is detected.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-IDPS-00169
- Vuln IDs
-
- V-206884
- V-34749
- Rule IDs
-
- SV-206884r383119_rule
- SV-45659
Checks: C-7138r298164_chk
Verify the IDPS fails to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation. If the IDPS does not fail to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation, this is a finding.
Fix: F-7138r298165_fix
Configure the IDPS to fail to a secure state which maintains access control mechanisms when the IDPS hardware, software, or firmware fails on initialization/shutdown or experiences a sudden abort during normal operation.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-NET-000236-IDPS-00170
- Vuln IDs
-
- V-206885
- V-34750
- Rule IDs
-
- SV-206885r383122_rule
- SV-45660
Checks: C-7139r298167_chk
Verify the IDPS, upon failure of the IDPS function, saves diagnostic information, logs system messages, and loads the most current security policies, rules, and signatures when restarted. If IDPS function, upon system failure, does not save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted, this is a finding.
Fix: F-7139r298168_fix
Configure the IDPS to, upon failure of the IDPS function, save diagnostic information, log system messages, and load the most current security policies, rules, and signatures when restarted.
- RMF Control
- Severity
- M
- CCI
- CCI-004965
- Version
- SRG-NET-000246-IDPS-00205
- Vuln IDs
-
- V-206887
- V-55357
- Rule IDs
-
- SV-206887r982258_rule
- SV-69603
Checks: C-7141r298173_chk
Verify the IDPS installs updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures. If the IDPS does not install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures, this is a finding.
Fix: F-7141r298174_fix
Configure the IDPS to install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- SRG-NET-000248-IDPS-00206
- Vuln IDs
-
- V-206888
- V-55359
- Rule IDs
-
- SV-206888r982259_rule
- SV-69605
Checks: C-7142r298176_chk
Verify the IDPS performs real-time monitoring of files from external sources at network entry/exit points. If the IDPS does not perform real-time monitoring of files from external sources at network entry/exit points, this is a finding.
Fix: F-7142r298177_fix
Configure the IDPS to perform real-time monitoring of files from external sources at network entry/exit points.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-IDPS-00176
- Vuln IDs
-
- V-206889
- V-34762
- Rule IDs
-
- SV-206889r1137734_rule
- SV-45686
Checks: C-7143r1137732_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS blocks malicious code. If the IPS does not block malicious code, this is a finding.
Fix: F-7143r1137733_fix
Configure the IPS to block malicious code.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-IDPS-00221
- Vuln IDs
-
- V-206890
- V-55361
- Rule IDs
-
- SV-206890r1137737_rule
- SV-69607
Checks: C-7144r1137735_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS quarantines blocks malicious code. If the IPS does not quarantine or blocks malicious code, this is a finding.
Fix: F-7144r1137736_fix
Configure the IPS to quarantine or block malicious code.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- SRG-NET-000249-IDPS-00222
- Vuln IDs
-
- V-206891
- V-55363
- Rule IDs
-
- SV-206891r383131_rule
- SV-69609
Checks: C-7145r298185_chk
Verify the IDPS sends an immediate (within seconds) alert to, at a minimum, the system administrator when malicious code is detected. If the IDPS does not send an immediate (within seconds) alert to, at a minimum, the system administrator when malicious code is detected, this is a finding.
Fix: F-7145r298186_fix
Configure the IDPS to send an immediate (within seconds) alert to, at a minimum, the system administrator when malicious code is detected.
- RMF Control
- Severity
- M
- CCI
- CCI-004964
- Version
- SRG-NET-000251-IDPS-00178
- Vuln IDs
-
- V-206892
- V-55597
- Rule IDs
-
- SV-206892r982260_rule
- SV-69843
Checks: C-7146r298188_chk
Verify the IDPS automatically installs updates to signature definitions, detection heuristics, and vendor-provided rules. If the IDPS does not automatically install updates to signature definitions, detection heuristics, and vendor-provided rules, this is a finding.
Fix: F-7146r298189_fix
Configure the IDPS to automatically install updates to signature definitions, detection heuristics, and vendor-provided rules.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000273-IDPS-00198
- Vuln IDs
-
- V-206893
- V-34788
- Rule IDs
-
- SV-206893r1137740_rule
- SV-45716
Checks: C-7147r1137738_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS blocks outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. If the IPS does not block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages, this is a finding.
Fix: F-7147r1137739_fix
Configure the IPS to block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. An acceptable alternative to blocking all Destination Unreachable responses is to filter Destination Unreachable messages generated by the firewall implementation to allow ICMP Destination Unreachable-- Fragmentation Needed but DF Bit Set (Type 3, Code 4) and apply this filter to the external interfaces.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-NET-000273-IDPS-00204
- Vuln IDs
-
- V-206894
- V-55355
- Rule IDs
-
- SV-206894r1137743_rule
- SV-69601
Checks: C-7148r1137741_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS blocks malicious ICMP packets by properly configuring ICMP signatures and rules. If the IPS does not block malicious ICMP packets by properly configuring ICMP signatures and rules, this is a finding.
Fix: F-7148r1137742_fix
Configure the IPS to block malicious ICMP packets by properly configuring ICMP signatures and rules.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-IDPS-00068
- Vuln IDs
-
- V-206895
- V-55397
- Rule IDs
-
- SV-206895r1137746_rule
- SV-69643
Checks: C-7149r1137744_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS prevents code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the IPS does not prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-7149r1137745_fix
Configure the IPS components to prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-IDPS-00182
- Vuln IDs
-
- V-206896
- V-55399
- Rule IDs
-
- SV-206896r1137749_rule
- SV-69645
Checks: C-7150r1137747_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS prevents code injection attacks launched against application objects including, at a minimum, application URLs and application code. If the IPS does not prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-7150r1137748_fix
Configure the IPS to prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- SRG-NET-000318-IDPS-00183
- Vuln IDs
-
- V-206897
- V-55401
- Rule IDs
-
- SV-206897r1137752_rule
- SV-69647
Checks: C-7151r1137750_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS prevents SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the IPS does not prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-7151r1137751_fix
Configure the IPS to prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-IDPS-00184
- Vuln IDs
-
- V-206898
- V-55403
- Rule IDs
-
- SV-206898r856536_rule
- SV-69649
Checks: C-7152r298206_chk
Verify the IDPS detects code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields. If the IDPS does not detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.
Fix: F-7152r298207_fix
Configure the IDPS components to detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-IDPS-00185
- Vuln IDs
-
- V-206899
- V-55407
- Rule IDs
-
- SV-206899r856537_rule
- SV-69653
Checks: C-7153r298209_chk
Verify the IDPS detects code injection attacks launched against application objects including, at a minimum, application URLs and application code. If the IDPS does not detect code injection attacks launched against application objects including, at a minimum, application URLs and application code, this is a finding.
Fix: F-7153r298210_fix
Configure the IDPS to detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002347
- Version
- SRG-NET-000319-IDPS-00186
- Vuln IDs
-
- V-206900
- V-55409
- Rule IDs
-
- SV-206900r856538_rule
- SV-69655
Checks: C-7154r298212_chk
Verify the IDPS detects SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields. If the IDPS does not detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields, this is a finding.
Fix: F-7154r298213_fix
Configure the IDPS to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000334-IDPS-00191
- Vuln IDs
-
- V-206902
- V-55325
- Rule IDs
-
- SV-206902r856540_rule
- SV-69571
Checks: C-7156r298218_chk
Verify the IDPS off-loads log records to a centralized log server. If the IDPS does not off-load log records to a centralized log server, this is a finding.
Fix: F-7156r298219_fix
Configure the IDPS to off-load log records to a centralized log server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-IDPS-00014
- Vuln IDs
-
- V-206903
- V-55331
- Rule IDs
-
- SV-206903r856541_rule
- SV-69577
Checks: C-7157r298221_chk
Verify the IDPS provides an alert to, at a minimum, the system administrator and ISSO when any audit failure events occur. If the IDPS does not provide an alert to, at a minimum, the system administrator and ISSO when any audit failure events occur, this is a finding.
Fix: F-7157r298222_fix
Configure the IDPS to provide an alert to, at a minimum, the system administrator and ISSO when any audit failure events occur.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-IDPS-00223
- Vuln IDs
-
- V-206904
- V-55329
- Rule IDs
-
- SV-206904r856542_rule
- SV-69575
Checks: C-7158r298224_chk
Verify the IDPS provides assign a critical severity level to all audit processing failures. If the IDPS does not assign a critical severity level to all audit processing failures, this is a finding.
Fix: F-7158r298225_fix
Configure the IDPS to assign a critical severity level to all audit processing failures.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-IDPS-00196
- Vuln IDs
-
- V-206905
- V-55345
- Rule IDs
-
- SV-206905r1137755_rule
- SV-69591
Checks: C-7159r1137753_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS protects against or limits the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis. If the device does not protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis, this is a finding.
Fix: F-7159r1137754_fix
Configure the IPS to protect against or limit the effects of known and unknown types of DoS attacks by employing rate-based attack prevention behavior analysis.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-IDPS-00197
- Vuln IDs
-
- V-206906
- V-55347
- Rule IDs
-
- SV-206906r1137758_rule
- SV-69593
Checks: C-7160r1137756_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS protect against or limits the effects of known and unknown types of DoS attacks by employing, also known as anomaly-based detection. If the device does not protect against or limit the effects of known and unknown types of DoS attacks by employing anomaly-based detection, this is a finding.
Fix: F-7160r1137757_fix
Configure the IPS to protect against or limit the effects of known and unknown types of DoS attacks by employing anomaly-based detection.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-NET-000362-IDPS-00198
- Vuln IDs
-
- V-206907
- V-55349
- Rule IDs
-
- SV-206907r1137761_rule
- SV-69595
Checks: C-7161r1137759_chk
If the device being reviewed is an IDS, this is not applicable. Verify the IPS protects against or limits the effects of known types of DoS attacks by employing signatures. If the device does not protect against or limit the effects of known types of DoS attacks by employing signatures, this is a finding.
Fix: F-7161r1137760_fix
Configure the IPS to protect against or limit the effects of known types of DoS attacks by employing signatures.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002656
- Version
- SRG-NET-000383-IDPS-00208
- Vuln IDs
-
- V-206909
- V-55365
- Rule IDs
-
- SV-206909r856546_rule
- SV-69611
Checks: C-7163r298239_chk
Verify the IDPS integrates with a network-wide monitoring capability which includes sensors, event databases, and management consoles. If the IDPS does not integrate with a network-wide monitoring capability which includes sensors, event databases, and management consoles, this is a finding.
Fix: F-7163r298240_fix
Configure the IDPS components, including sensors, event databases, and management consoles to integrate with a network-wide monitoring capability.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002683
- Version
- SRG-NET-000384-IDPS-00209
- Vuln IDs
-
- V-206910
- V-55375
- Rule IDs
-
- SV-206910r856547_rule
- SV-69621
Checks: C-7164r298242_chk
Verify the IDPS detects network services that have not been authorized or approved by the ISSO or ISSM, at a minimum. If the IDPS does not detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum, this is a finding.
Fix: F-7164r298243_fix
Configure the IDPS to detect network services that have not been authorized or approved by the ISSO or ISSM, at a minimum.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-IDPS-00210
- Vuln IDs
-
- V-206911
- V-55377
- Rule IDs
-
- SV-206911r856548_rule
- SV-69623
Checks: C-7165r298245_chk
Verify the IDPS generates a log record when unauthorized network services are detected. If the IDPS does not generate a log record when unauthorized network services are detected, this is a finding.
Fix: F-7165r298246_fix
Configure the IDPS to generate a log record when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002684
- Version
- SRG-NET-000385-IDPS-00211
- Vuln IDs
-
- V-206912
- V-55379
- Rule IDs
-
- SV-206912r856549_rule
- SV-69625
Checks: C-7166r298248_chk
Verify the IDPS generates an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected. If the IDPS does not generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected, this is a finding.
Fix: F-7166r298249_fix
Configure the IDPS to generate an alert to the ISSM and ISSo, at a minimum, when unauthorized network services are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002661
- Version
- SRG-NET-000390-IDPS-00212
- Vuln IDs
-
- V-206913
- V-55381
- Rule IDs
-
- SV-206913r856550_rule
- SV-69627
Checks: C-7167r298251_chk
Verify the IDPS continuously monitors inbound communications traffic for unusual/unauthorized activities or conditions. If the IDPS does not continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions, this is a finding.
Fix: F-7167r298252_fix
Configure the IDPS to continuously monitor inbound communications traffic for unusual/unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002662
- Version
- SRG-NET-000391-IDPS-00213
- Vuln IDs
-
- V-206914
- V-55383
- Rule IDs
-
- SV-206914r856551_rule
- SV-69629
Checks: C-7168r298254_chk
Verify the IDPS continuously monitors outbound communications traffic for unusual/unauthorized activities or conditions. If the IDPS does not continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions, this is a finding.
Fix: F-7168r298255_fix
Configure the IDPS to continuously monitor outbound communications traffic for unusual/unauthorized activities or conditions.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-00214
- Vuln IDs
-
- V-206915
- V-55385
- Rule IDs
-
- SV-206915r1107640_rule
- SV-69631
Checks: C-7169r1107638_chk
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when intrusion detection events are detected which indicate a compromise or potential for compromise. If the IDPS does not send an alert to, at a minimum, the ISSO and ISSM when intrusion detection events are detected which indicate a compromise or potential for compromise, this is a finding.
Fix: F-7169r1107639_fix
Configure the IDPS to send an alert to, at a minimum, the ISSO and ISSM when intrusion detection events are detected which indicate a compromise or potential for compromise.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-00215
- Vuln IDs
-
- V-206916
- V-55387
- Rule IDs
-
- SV-206916r971533_rule
- SV-69633
Checks: C-7170r298260_chk
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise, this is a finding.
Fix: F-7170r298261_fix
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected which indicate a compromise or potential for compromise.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-00216
- Vuln IDs
-
- V-206917
- V-55389
- Rule IDs
-
- SV-206917r971533_rule
- SV-69635
Checks: C-7171r298263_chk
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when root level intrusion events which provide unauthorized privileged access are detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events which provide unauthorized privileged access are detected, this is a finding.
Fix: F-7171r298264_fix
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events which provide unauthorized privileged access are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-00217
- Vuln IDs
-
- V-206918
- V-55391
- Rule IDs
-
- SV-206918r971533_rule
- SV-69637
Checks: C-7172r298266_chk
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when user level intrusions which provide non-privileged access are detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events when user level intrusions which provide non-privileged access are detected, this is a finding.
Fix: F-7172r298267_fix
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when user level intrusions which provide non-privileged access are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-00218
- Vuln IDs
-
- V-206919
- V-55393
- Rule IDs
-
- SV-206919r971533_rule
- SV-69639
Checks: C-7173r298269_chk
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when denial of service incidents are detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when root level intrusion events when denial of service incidents are detected, this is a finding.
Fix: F-7173r298270_fix
Configure the IDPS to send an alert to, at a minimum, the IAM and IAO when denial of service incidents are detected.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- SRG-NET-000392-IDPS-00219
- Vuln IDs
-
- V-206920
- V-55395
- Rule IDs
-
- SV-206920r971533_rule
- SV-69641
Checks: C-7174r298272_chk
Verify the IDPS sends an alert to, at a minimum, the ISSM and ISSO when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected. If the IDPS does not send an alert to, at a minimum, the ISSM and ISSO when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected, this is a finding.
Fix: F-7174r298273_fix
Configure the IDPS to send an alert to, at a minimum, the ISSM and ISSO when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-NET-000401-IDPS-00203
- Vuln IDs
-
- V-206921
- V-55351
- Rule IDs
-
- SV-206921r383821_rule
- SV-69597
Checks: C-7175r298275_chk
Verify the IDPS, for fragmented packets, either blocks the packets or properly reassembles the packets before inspecting and forwarding. For fragmented packets, if the IDPS does not either block the packets or properly reassemble the packets before inspecting and forwarding, this is a finding.
Fix: F-7175r298276_fix
Configure the IDPS to, for fragmented packets, either block the packets or properly reassemble the packets before inspecting and forwarding.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000511-IDPS-00012
- Vuln IDs
-
- V-206922
- V-55327
- Rule IDs
-
- SV-206922r856558_rule
- SV-69573
Checks: C-7176r298278_chk
Verify the IDPS off-loads log records to a centralized log server in real-time. If the IDPS does not off-load log records to a centralized log server in real-time, this is a finding.
Fix: F-7176r298279_fix
Configure the IDPS to off-load log records to a centralized log server in real-time.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-NET-000512-IDPS-00194
- Vuln IDs
-
- V-206923
- V-55337
- Rule IDs
-
- SV-206923r385561_rule
- SV-69583
Checks: C-7177r298281_chk
Verify the IDPS is configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices. If the IDPS is not configured in accordance with the security configuration settings based on DoD security policy and technology-specific security best practices, this is a finding.
Fix: F-7177r298282_fix
Configure the IDPS to comply with the security configuration settings based on DoD security policy and technology-specific security best practices.
- RMF Control
- Severity
- M
- CCI
- CCI-004866
- Version
- SRG-NET-000705-IDPS-00110
- Vuln IDs
-
- V-263663
- Rule IDs
-
- SV-263663r991597_rule
Checks: C-67576r982262_chk
Verify the IDPS is configured to employ organization-defined controls by type of DoS to achieve the denial-of-service objective. If the IDPS is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix: F-67484r982263_fix
Configure the IDPS to employ organization-defined controls by type of DoS to achieve the DoS objective.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-IDPS-00120
- Vuln IDs
-
- V-263664
- Rule IDs
-
- SV-263664r1137722_rule
Checks: C-67577r982570_chk
Verify the IDPS is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the IDPS is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-67485r982266_fix
Configure the IDPS to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-IDPS-00160
- Vuln IDs
-
- V-263665
- Rule IDs
-
- SV-263665r991599_rule
Checks: C-67578r982268_chk
Verify the IDPS is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the IDPS is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-67486r982269_fix
Configure the IDPS to establish organization-defined alternate communications paths for system operations organizational command and control.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002190
- Version
- SRG-NET-000323-IDPS-00188
- Vuln IDs
-
- V-278978
- Rule IDs
-
- SV-278978r1137721_rule
Checks: C-83526r1137719_chk
Verify that the IDPS is configured to use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions. If the IDPS does not use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions, this is a finding.
Fix: F-83431r1137720_fix
Configure the IDPS to use organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
- RMF Control
- Severity
- M
- CCI
- CCI-004982
- Version
- SRG-NET-000775-IDPS-00170
- Vuln IDs
-
- V-278979
- Rule IDs
-
- SV-278979r1137725_rule
Checks: C-83527r1137723_chk
Verify the IDPS is configured to provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices. If the IDPS does not provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices, this is a finding.
Fix: F-83432r1137724_fix
Configure the IDPS to provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices.