Check: TIPP-IP-000230
Trend Micro TippingPoint IDPS STIG:
TIPP-IP-000230
(in versions v2 r1 through v1 r1)
Title
The SMS must be configured to remove or disable non-essential capabilities on SMS and TPS which are not required for operation or not related to IDPS functionality (e.g., web server, SSH, telnet, and TAXII). (Cat II impact)
Discussion
An IDPS can be capable of providing a wide variety of capabilities. Not all of these capabilities are necessary. Unnecessary services, functions, and applications increase the attack surface (sum of attack vectors) of a system. These unnecessary capabilities are often overlooked and therefore may remain unsecured.
Check Content
1. In the Trend Micro SMS interface, go to the "Devices" tab". 2. Select the Device to be modified. 3. Click "Device Configuration" and "Services". If SSH is enabled, this is a finding. Under "FIPS Settings", if the box is unchecked, this is a finding.
Fix Text
1. In the Trend Micro SMS interface, go to the "Devices" tab". 2. Then Select the Device to be modified. 3. Click "Device Configuration" and "Services". 4. Uncheck enabled for SSH. 5. Go to "FIPS Settings", select "enabled" for "FIPS Mode". 6. Click OK. CAUTION: This should be done under an approved maintenance window, as selecting FIPS Mode will cause the TPS to reboot.
Additional Identifiers
Rule ID: SV-242188r710107_rule
Vulnerability ID: V-242188
Group Title: SRG-NET-000131-IDPS-00011
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
Configure the system to provide only organization-defined mission essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |