F5BI-DM-000263 - The BIG-IP appliance must be configured to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B.

Information

By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged onto the network device. An example of a mechanism to facilitate this would be through the utilization of SNMP traps.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the BIG-IP appliance to use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW with CJCSM 6510.01B.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_Y24M01_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|CM-6b., 800-53|SI-4(12), CAT|II, CCI|CCI-000366, CCI|CCI-001274, Rule-ID|SV-229010r879887_rule, STIG-ID|F5BI-DM-000263, STIG-Legacy|SV-74655, STIG-Legacy|V-60225, Vuln-ID|V-229010

Plugin: F5

Control ID: 871ca14bebd25ca8da16eb3e9fb485f5b3d2ab1b1a0efc587c6bae6a9c012cb1