CCI-002684
CCI-002684 Definition
Status | |
Type | CheckType.technical |
Master Assessment Datasheet
Implementation Guidance
The organization being inspected/assessed configures the information system to audit and/or alert at a minimum, the ISSO and ISSM when unauthorized network services are detected. For information system components that have applicable STIGs or SRGs, the organization being inspected/assessed must comply with the STIG/SRG guidance that pertains to CCI 2684. DoD has defined the personnel or roles as at a minimum, the ISSO and ISSM.
Validation Procedures
The organization conducting the inspection/assessment examines the information system to ensure the organization being inspected/assessed configures the information system to audit and/or alert at a minimum, the ISSO and ISSM when unauthorized network services are detected. For information system components that have applicable STIGs or SRGs, the organization conducting the inspection/assessment evaluates the components to ensure that the organization being inspected/assessed has configured the information system in compliance with the applicable STIGs and SRGs pertaining to CCI 2684. DoD has defined the personnel or roles as at a minimum, the ISSO and ISSM.
Compelling Evidence
1.) Samples of the alerts/audit trail of information system configuration to audit and/or alert at a minimum, the ISO and ISSM when unauthorized network services are detected.