STIGQter STIGQter: STIG Summary: Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide Version: 2 Release: 6 Benchmark Date: 24 Jul 2020:

The IDPS must produce audit records containing information to establish the outcome of events associated with detected harmful or potentially harmful traffic, including, at a minimum, capturing all associated communications traffic.

DISA Rule

SV-45386r2_rule

Vulnerability Number

V-34544

Group Title

SRG-NET-000078-IDPS-00063

Rule Version

SRG-NET-000078-IDPS-00063

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the IDPS components to ensure entries sent to the audit log include, at a minimum, capturing all associated communications traffic.

Check Contents

Verify the entries sent to the audit log include, at a minimum, capturing all associated communications traffic.

If the audit log event records do not include, at a minimum, capturing all associated communications traffic, this is a finding.

Vulnerability Number

V-34544

Documentable

False

Rule Version

SRG-NET-000078-IDPS-00063

Severity Override Guidance

Verify the entries sent to the audit log include, at a minimum, capturing all associated communications traffic.

If the audit log event records do not include, at a minimum, capturing all associated communications traffic, this is a finding.

Check Content Reference

M

Target Key

2358

Comments