Check: DSN14.02
Defense Switched Network (DSN) STIG:
DSN14.02
(in versions v2 r8 through v2 r7)
Title
Documented procedures do not exist that will prepare for a suspected compromise of a DSN component. (Cat II impact)
Discussion
Requirement: The IAO will ensure that compromise recovery procedures are documented that will accomplish the following: - Verify the integrity of the hardware, software, and communication lines configuration.- Verify the integrity of the switch tables (database). - Perform an audit trail analysis and evaluation. - Enforce the change of all passwords for accessing the A/NM domain .- Report to the Theater and other concerned authorities the detection of possible unauthorized physical intrusion.The following measures will ensure that a compromise of a DSN component will be handled and reported properly: verification of the integrity of the hardware, software, communication lines configuration, switch tables (database); performance of an audit trail analysis and evaluation; enforcing the change of all passwords for accessing the DSN component; reporting to the theater and other concerned authorities the detection of possible unauthorized physical intrusion.
Check Content
Interview the IAO and/or SA to confirm compliance through discussion, review of site policy and procedures, diagrams, documentation, configuration files, logs, records, DAA/other approvals, etc as applicable.
Fix Text
Implement processes / procedures, generate documents, and/or adjust configuration(s) / architecture, as necessary to comply with policy.
Additional Identifiers
Rule ID: SV-8458r1_rule
Vulnerability ID: V-7972
Group Title: No SOP for responding to a device compromise
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |