Skip to content

The IDPS must generate a log record when unauthorized network services are detected.

An XCCDF Rule

Description

Unauthorized or unapproved network services lack organizational verification or validation and therefore may be unreliable or serve as malicious rogues for valid services. Examples of network services include service-oriented architectures (SOAs), cloud-based services (e.g., infrastructure as a service, platform as a service, or software as a service), cross-domain, Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing.

ID
SV-206911r856548_rule
Version
SRG-NET-000385-IDPS-00210
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the IDPS to generate a log record when unauthorized network services are detected.