STIGQter STIGQter: STIG Summary: Juniper SRX SG IDPS Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 28 Jul 2017: To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.

DISA Rule

SV-80903r1_rule

Vulnerability Number

V-66413

Group Title

SRG-NET-000319-IDPS-00184

Rule Version

JUSX-IP-000014

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure an attack group for "INJ" and "CMDEXEC" attacks in the signature database which are recommended. Consult the Junos Security Intelligence Center IDP signatures website for a list and details of each attack, along with recommended action upon detection. Then add the attack group to a policy.

Specify the attack group as match criteria in an IDP policy rule.

Check Contents

Verify an attack group is configured.

[edit]
show security idp policies

If an attack group or rule(s) is not implemented to monitor for code injection attacks that could be launched against data storage objects, this is a finding.

Vulnerability Number

V-66413

Documentable

False

Rule Version

JUSX-IP-000014

Severity Override Guidance

Verify an attack group is configured.

[edit]
show security idp policies

If an attack group or rule(s) is not implemented to monitor for code injection attacks that could be launched against data storage objects, this is a finding.

Check Content Reference

M

Target Key

3037

Comments