STIGQter STIGQter: STIG Summary: Network Infrastructure Policy Security Technical Implementation Guide Version: 9 Release: 10 Benchmark Date: 24 Jan 2020:

The Intrusion Detection and Prevention System (IDPS) file checksums provided by the vendor must be compared and verified with checksums computed from CD or downloaded files.

DISA Rule

SV-20046r2_rule

Vulnerability Number

V-18511

Group Title

Update files are not validated for accuracy

Rule Version

NET-IDPS-032

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Establish change control procedures that include file validation and integrity.

Check Contents

Interview the SA and determine the process of software and signature validation.

If file checksums provided by the vendor are not compared and verified with checksums computed from CD or downloaded files, this is a finding.

Vulnerability Number

V-18511

Documentable

False

Rule Version

NET-IDPS-032

Severity Override Guidance

Interview the SA and determine the process of software and signature validation.

If file checksums provided by the vendor are not compared and verified with checksums computed from CD or downloaded files, this is a finding.

Check Content Reference

I

Target Key

838

Comments