Capacity
CCI-002656
Configures individual intrusion detection tools into an system-wide intrusion detection system.
Choose one
1
Rule
Severity: Low
The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages.
1
Rule
Severity: Low
Kona Site Defender providing content filtering must be configured to integrate with a system-wide intrusion detection system.
2
Rule
Severity: Medium
The ALG providing content filtering must be configured to integrate with a system-wide intrusion detection system.
1
Rule
Severity: Medium
The CA API Gateway providing content filtering must be configured to integrate with a system-wide intrusion detection system.
1
Rule
Severity: Medium
The DBN-6300 must integrate with a network-wide monitoring capability.
1
Rule
Severity: Low
The DataPower Gateway providing content filtering must be configured to integrate with a system-wide intrusion detection system.
2
Rule
Severity: Medium
IDPS components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.
1
Rule
Severity: Medium
Symantec ProxySG providing content filtering must be configured to integrate with a system-wide intrusion detection system.
1
Rule
Severity: Medium
SMS and TPS components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.
2
Rule
Severity: Low
The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.
2
Rule
Severity: Medium
Palo Alto Networks security platform components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.
1
Rule
Severity: High
For Infrastructure as a Service (IaaS)/Platform as a Service (PaaS), the Mission Owner must configure an intrusion detection and prevention system (IDPS) to protect DOD virtual machines (VMs), services, and applications.
1
Rule
Severity: Medium
The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
1
Rule
Severity: Medium
The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%