STIGhub
STIGs
RMF Controls
Compare
← SI-4 (1) — System Monitoring
CCI-002656
Definition
Configure individual intrusion detection tools into a system-wide intrusion detection system.
Parent Control
SI-4 (1)
System Monitoring
System and Information Integrity
Linked STIG Checks (15)
V-237053
CAT III
The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages.
A10 Networks ADC ALG Security Technical Implementation Guide
V-76441
CAT III
Kona Site Defender providing content filtering must be configured to integrate with a system-wide intrusion detection system.
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
V-205012
CAT II
The ALG providing content filtering must be configured to integrate with a system-wide intrusion detection system.
Application Layer Gateway Security Requirements Guide
V-237403
CAT II
The CA API Gateway providing content filtering must be configured to integrate with a system-wide intrusion detection system.
CA API Gateway ALG Security Technical Implementation Guide
V-259867
CAT I
For Infrastructure as a Service (IaaS)/Platform as a Service (PaaS), the Mission Owner must configure an intrusion detection and prevention system (IDPS) to protect DOD virtual machines (VMs), services, and applications.
Cloud Computing Mission Owner Network Security Requirements Guide
V-237567
CAT II
The DBN-6300 must integrate with a network-wide monitoring capability.
DBN-6300 IDPS Security Technical Implementation Guide
V-266146
CAT II
The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-65283
CAT III
The DataPower Gateway providing content filtering must be configured to integrate with a system-wide intrusion detection system.
IBM DataPower ALG Security Technical Implementation Guide
V-55365
CAT II
IDPS components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
V-206909
CAT II
IDPS components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.
Intrusion Detection and Prevention Systems Security Requirements Guide
V-228864
CAT III
The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.
Palo Alto Networks ALG Security Technical Implementation Guide
V-207705
CAT II
Palo Alto Networks security platform components, including sensors, event databases, and management consoles must integrate with a network-wide monitoring capability.
Palo Alto Networks IDPS Security Technical Implementation Guide
V-279203
CAT II
The Edge SWG must control remote access methods.
Symantec Edge SWG ALG Security Technical Implementation Guide
V-94333
CAT II
Symantec ProxySG providing content filtering must be configured to integrate with a system-wide intrusion detection system.
Symantec ProxySG ALG Security Technical Implementation Guide
V-242176
CAT II
The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
Trend Micro TippingPoint IDPS Security Technical Implementation Guide