|Finding ID||Version||Rule ID||IA Controls||Severity|
|A HIDS or HIPS application is a secondary line of defense behind the antivirus. The application will monitor all ports and the dynamic state of a development system. If the application detects irregularities on the system, it will block incoming traffic that may potentially compromise the development system that can lead to a DoS or data theft.|
|Test and Development Zone C Security Technical Implementation Guide||2018-09-17|
|Check Text ( C-46713r3_chk )|
| Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding. |
If there isn't any application development occurring in the zone environment, this requirement is not applicable.
|Fix Text (F-44451r2_fix)|
|Install and configure a HIDS or HIPS application on development system images.|