UCF STIG Viewer Logo

An Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor the network segment hosting web, application, and database servers.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18492 NET-IDPS-018 SV-20027r2_rule Medium
Description
Attacks can originate within the enclave boundary. Hence, deploying an IDPS on the network segment hosting web, application, and database servers is imperative. The servers are critical resource and the network segment hosting them will receive the most traffic within the enclave. Deploying IDPS on this network is promotes defense-in-depth principles that will enable operations to detect attacks quickly and take corrective actions.
STIG Date
Network Infrastructure Policy Security Technical Implementation Guide 2017-12-07

Details

Check Text ( C-21126r3_chk )
Review topology of the network segment hosting the web, application, and database servers.

If this segment is not being monitored by an IDPS sensor, this is a finding.
Fix Text (F-19914r2_fix)
Implement an IDPS strategy to monitor the network segment hosting web, application, and database servers.