Skip to content

Simple Network Management Protocol (SNMP) is used and it is not configured in accordance with the guidance contained in the Network Infrastructure STIG.

An XCCDF Rule

Description

There are vulnerabilities in some implementations and some configurations of SNMP. Therefore if SNMP is used the guidelines found in the Network Infrastructure STIG in selecting a version of SNMP to use and how to configure it will be followed. If Simple Network Management Protocol (SNMP) is used, the IAO/NSO will ensure it is configured in accordance with the guidance contained in the Network Infrastructure STIG.

Property Value
Responsibility Information Assurance Officer
Potential Impact Network monitoring tools that are not modified to match the configuration used for SNMP in the SAN will fail.

ID
SV-6798r1_rule
Version
SAN04.021.00
Severity
Medium
Updated

Remediation Templates

A Manual Procedure

Develop a plan to implement SNMP that is compliant with the Network Infrastructure STIG.  Obtain CM approval and execute the plan.

NOTE: The intent of this check is to ensure that the other applicable checklists were applied. If they are applied then, regardless of what the findings are, this is not a finding. The objective of this policy is met if the other checklists were applied and documented.