STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide

V-55323

CAT II (Medium)

IDPS must support centralized management and configuration of the content captured in audit records generated by all IDPS components.

Rule ID

SV-69569r1_rule

STIG

Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide

Version

V2R6

CCIs

CCI-001844

Discussion

Without the ability to centrally manage the content captured in the log records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a delayed or incomplete analysis of an attack. Centralized management and storage of log records increases efficiency in maintenance and management of records as well as facilitates the backup and archiving of those records.<br /><br />The IDPS must be configured to support centralized management and configuration of the content to be captured in audit records generated by all network components. IDPS sensors and consoles must have the capability to support centralized logging. They must be configured to send log messages to centralized, redundant servers and be capable of being remotely configured to change logging parameters (such as facility and severity levels).

Check Content

Verify the IDPS is configured to support centralized management and configuration of the content captured in audit records generated by all IDPS components.<br /><br />If the IDPS does not support centralized management and configuration of the content captured in audit records generated by all IDPS components, this is a finding.

Fix Text

Configure the IDPS to support centralized management and configuration of the content captured in audit records generated by all IDPS components.