STIGQter STIGQter: STIG Summary: Juniper SRX SG IDPS Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 28 Jul 2017: To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against application objects, including, at a minimum, application URLs and application code.

DISA Rule

SV-80905r1_rule

Vulnerability Number

V-66415

Group Title

SRG-NET-000319-IDPS-00185

Rule Version

JUSX-IP-000015

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure an attack group for "INJ", "SQL", and "CMDEXEC" attacks in the signature database which are recommended. Consult the Junos Security Intelligence Center IDP signatures website for a list and details of each attack, along with recommended action upon detection. Then add the attack group to a policy.

Specify the attack group as match criteria in an IDP policy rule.

Check Contents

Verify an attack group or rule is configured.

[edit]
show security idp policies

If an attack group or rule(s) is not implemented to monitor for code injection attacks that could be launched against application objects, this is a finding.

Vulnerability Number

V-66415

Documentable

False

Rule Version

JUSX-IP-000015

Severity Override Guidance

Verify an attack group or rule is configured.

[edit]
show security idp policies

If an attack group or rule(s) is not implemented to monitor for code injection attacks that could be launched against application objects, this is a finding.

Check Content Reference

M

Target Key

3037

Comments