An Intrusion Detection and Prevention System (IDPS) sensor must be deployed to monitor network segments that house network security management servers.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-251337NET-IDPS-019NET-IDPS-019SV-251337r853644_rule2024-08-0210
Description
The initial step in IDPS deployment is determining where sensors should be placed. Because attacks originate at the enclave perimeter and within the enclave boundary an IDPS implementation at the enclave perimeter only will not suffice. By placing IDPS technology throughout the Enterprise Regional enclaves and stand-alone enclaves, system administrators can track the spread of attacks and take corrective actions to prevent attacks reaching critical resources.
ℹ️ Check
Review the management network topology and verify network security management servers are being monitored by an IDPS. If an IDPS sensor is not deployed to monitor all segments housing network security management servers, this is a finding.
✔️ Fix
Install an IDPS to monitor and protect the Management Network (management subnet or OOB network).