SV-95163r1_rule
V-80459
SRG-APP-000368
BROM-00-000825
CAT III
10
From the management console, navigate to the "Threats" menu.
1. Select the security incident in question. View all after-the-fact information.
2. Click "Generate Report" to create a report in Security Threat Information Exchange (STIX) or Malware Attribution Enumeration and Characterization (MAEC) format.
3. Click "Threat Information" to export security incident-related information such as file hashes and IP addresses (in ".csv" format).
Examine the site System Security Plan (SSP) or other documentation. Verify there is a documented procedure for when security incident reports need to be exported.
If a procedure for providing report generation that supports after-the-fact investigations of security incidents has not been documented, this is a finding.
V-80459
False
BROM-00-000825
Examine the site System Security Plan (SSP) or other documentation. Verify there is a documented procedure for when security incident reports need to be exported.
If a procedure for providing report generation that supports after-the-fact investigations of security incidents has not been documented, this is a finding.
M
3375