Check: SRG-NET-000249-IDPS-00221
Intrusion Detection and Prevention Systems SRG:
SRG-NET-000249-IDPS-00221
(in versions v3 r2 through v2 r2)
Title
The IDPS must quarantine and/or delete malicious code. (Cat II impact)
Discussion
Configuring the network element to delete and/or quarantine based on local organizational incident handling procedures minimizes the impact of this code on the network. Malicious code includes, but is not limited to, viruses, worms, Trojan horses, and spyware. The code provides the ability for a malicious user to read from and write to files and folders on a computer's hard drive. Malicious code may also be able to run and attach programs, which may allow the unauthorized distribution of malicious mobile code. Sometimes it is necessary to generate a log event and then automatically delete the malicious code; however, for critical attacks or where forensic evidence is deemed necessary, the preferred action is for the file to be quarantined for further investigation. This requirement is limited to network elements that perform security functions, such as ALG and IDPS.
Check Content
Verify the IDPS quarantines and/or delete malicious code. If the IDPS does not quarantine and/or delete malicious code, this is a finding.
Fix Text
Configure the IDPS to quarantine and/or delete malicious code.
Additional Identifiers
Rule ID: SV-206890r383131_rule
Vulnerability ID: V-206890
Group Title: SRG-NET-000249
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001243 |
Configure malicious code protection mechanisms to block malicious code; quarantine malicious code; and/or take organization-defined action(s) in response to malicious code detection. |
Controls
Number | Title |
---|---|
SI-3 |
Malicious Code Protection |