Development systems must have HIDS or HIPS installed and configured with up-to-date signatures.

From Test and Development Zone B Security Technical Implementation Guide

Part of ENTD0080 - HIDS or HIPS not installed on development system.

Associated with IA controls: ECID-1, ECSC-1

SV-51296r1_rule Development systems must have HIDS or HIPS installed and configured with up-to-date signatures.

Vulnerability discussion

A HIDS or HIPS application is a secondary line of defense behind the antivirus. The application will monitor all ports and the dynamic state of a development system. If the application detects irregularities on the system, it will block incoming traffic that may potentially compromise the development system that can lead to a DoS or data theft.

Check content

Review the development images to determine whether a HIDS or HIPS application is installed and configured. If a HIDS or HIPS application is not installed and configured on the development image, this is a finding. If there isn't any application development occurring in the zone environment, this requirement is not applicable.

Fix text

Install and configure a HIDS or HIPS application on development system images.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer