STIGQter STIGQter: STIG Summary: Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide Version: 2 Release: 6 Benchmark Date: 24 Jul 2020:

To protect against unauthorized data mining, the IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

DISA Rule

SV-69649r1_rule

Vulnerability Number

V-55403

Group Title

SRG-NET-000319-IDPS-00184

Rule Version

SRG-NET-000319-IDPS-00184

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the IDPS components to detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

Check Contents

Verify the IDPS detects code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

If the IDPS does not detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.

Vulnerability Number

V-55403

Documentable

False

Rule Version

SRG-NET-000319-IDPS-00184

Severity Override Guidance

Verify the IDPS detects code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

If the IDPS does not detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields, this is a finding.

Check Content Reference

M

Target Key

2358

Comments