STIGQter STIGQter: STIG Summary: Network Infrastructure Policy Security Technical Implementation Guide Version: 9 Release: 10 Benchmark Date: 24 Jan 2020:

Intrusion Detection and Prevention System (IDPS) traffic between the sensor and the security management or sensor data collection servers must traverse a dedicated Virtual Local Area Network (VLAN) logically separating IDPS traffic from all other enclave traffic.

DISA Rule

SV-20032r2_rule

Vulnerability Number

V-18497

Group Title

IDPS data from agent to MGT network is not secured

Rule Version

NET-IDPS-025

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Design a communications path for OOB traffic or create a VLAN for IDPS traffic to protect the data.

Check Contents

Review the network topology diagram and interview the ISSO to determine how the IDPS traffic between the sensor and the security management or sensor data collection servers is transported.

If the IDPS traffic does not traverse a dedicated VLAN logically separating IDPS traffic from all other enclave traffic, this is a finding.

Vulnerability Number

V-18497

Documentable

False

Rule Version

NET-IDPS-025

Severity Override Guidance

Review the network topology diagram and interview the ISSO to determine how the IDPS traffic between the sensor and the security management or sensor data collection servers is transported.

If the IDPS traffic does not traverse a dedicated VLAN logically separating IDPS traffic from all other enclave traffic, this is a finding.

Check Content Reference

M

Target Key

838

Comments