UCF STIG Viewer Logo

Intrusion Detection and Prevention System (IDPS) traffic between the sensor and the security management or sensor data collection servers must traverse a dedicated Virtual Local Area Network (VLAN) logically separating IDPS traffic from all other enclave traffic.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18497 NET-IDPS-025 SV-20032r2_rule Medium
Description
All IDPS data collected by agents in the enclave at required locations must also be protected by logical separation when in transit from the agent to the management or database servers located on the Network Management subnet.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2016-12-22

Details

Check Text ( C-21132r2_chk )
Review the network topology diagram and interview the ISSO to determine how the IDPS traffic between the sensor and the security management or sensor data collection servers is transported.

If the IDPS traffic does not traverse a dedicated VLAN logically separating IDPS traffic from all other enclave traffic, this is a finding.
Fix Text (F-19087r1_fix)
Design a communications path for OOB traffic or create a VLAN for IDPS traffic to protect the data.