STIGQter STIGQter: STIG Summary: Network Infrastructure Policy Security Technical Implementation Guide Version: 9 Release: 10 Benchmark Date: 24 Jan 2020:

The organization must implement a deep packet inspection solution when protecting perimeter boundaries.

DISA Rule

SV-15268r6_rule

Vulnerability Number

V-14642

Group Title

No deep packet inspection.

Rule Version

NET0365

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Implement a deep packet inspection solution at the enclave boundaries. Verify any IA appliances used for deep packet inspection are connected, properly configured, and actively inspecting all ingress and egress network traffic.

Check Contents

Determine which type of solution is used for deep packet inspection at the enclave boundary. Acceptable solutions for meeting this requirement are a deep packet inspection firewall, or a stateful packet inspection firewall in conjunction with any combination of application firewalls or application layer gateways.

If the organization does not have any implementation of deep packet inspection protecting their network perimeter boundaries, this is a finding.

Exception: If the perimeter security for the enclave or B/C/P/S is provisioned via the JRSS, then this requirement is not applicable.

Vulnerability Number

V-14642

Documentable

False

Rule Version

NET0365

Severity Override Guidance

Determine which type of solution is used for deep packet inspection at the enclave boundary. Acceptable solutions for meeting this requirement are a deep packet inspection firewall, or a stateful packet inspection firewall in conjunction with any combination of application firewalls or application layer gateways.

If the organization does not have any implementation of deep packet inspection protecting their network perimeter boundaries, this is a finding.

Exception: If the perimeter security for the enclave or B/C/P/S is provisioned via the JRSS, then this requirement is not applicable.

Check Content Reference

M

Target Key

838

Comments