Under active development Content is continuously updated and improved

SM-26Intrusion Detection Systems

>Control Description

Organization has an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) deployment(s) and ensures the following: • signature definitions are updated including the removal of false positive signatures • non-signature based attacks are defined • IDS/IPS are configured to capture malicious (both signature and non-signature based) traffic • alerts are reviewed and resolved by authorized personnel when malicious traffic is detected

Theme

Technology

Type

Detective

Policy/Standard

Information Systems Operations Policy

>Implementation Guidance

1. Ensure that the Organization has a policy or standard that covers the use and management of intrusion detection system (IDS) or intrusion prevention system (IPS) tools on its in-scope systems. 2. Ensure that there is an intrusion detection system (IDS) or intrusion prevention system (IPS) deployed on all in-scope systems. 3. Ensure that IDS/IPS tool is configured in a manner that: • signature definitions are updated including the removal of false positive signatures • non-signature based attacks are defined • IDS/IPS are configured to capture malicious (both signature and non-signature based) traffic • alerts are reviewed and resolved by authorized personnel when malicious traffic is detected 4. Ensure that the ability to disable IDS/IPS tools are restricted to limited personnel, and can only be disabled with a proper justification and for a limited time.

>Testing Procedure

1. Inspect the Organization has a policy or standard that details the use and management of intrusion detection system (IDS) or intrusion prevention system (IPS) tools on its in-scope systems. 2. Obtain a list of all in-scope systems, and for a given sample, confirm that IDS/IPS is running on those systems, and that they are up to date. 3. Inspect the IDS/IPS rulesets and ensure that they are configured with the items below: • signature definitions are updated including the removal of false positive signatures • non-signature based attacks are defined • IDS/IPS are configured to capture malicious (both signature and non-signature based) traffic • alerts are reviewed and resolved by authorized personnel when malicious traffic is detected 4. For a sample of alerts, confirm that they were reviewed and resolved by the authorized personnel. 5. Observe configuration showing that IDS/IPS tools cannot be disabled except by authorized personnel and can only be disabled with a proper justification and for a limited time.

>Audit Artifacts

E-SM-18
E-SM-19

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.