STIGQter STIGQter: STIG Summary: Network Infrastructure Policy Security Technical Implementation Guide Version: 9 Release: 10 Benchmark Date: 24 Jan 2020:

If an automated scheduler is used to provide updates to the sensors, an account on the file server must be defined that will provide access to the signatures only to the sensors.

DISA Rule

SV-20042r2_rule

Vulnerability Number

V-18507

Group Title

Access to signatures is not restricted

Rule Version

NET-IDPS-030

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Secure the signatures from access to accounts for IDS updates.

Check Contents

Review the file server accounts and determine if the accounts with read access to the IDPS signatures are provided only to the IDPS sensors.

If there are accounts other than those allocated for the IDPS sensors providing access to the signatures, this is a finding.

Vulnerability Number

V-18507

Documentable

False

Rule Version

NET-IDPS-030

Severity Override Guidance

Review the file server accounts and determine if the accounts with read access to the IDPS signatures are provided only to the IDPS sensors.

If there are accounts other than those allocated for the IDPS sensors providing access to the signatures, this is a finding.

Check Content Reference

M

Target Key

838

Comments