SLEM 5 must not have network interfaces in promiscuous mode unless approved and documented.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-261312
SLEM-05-252015
SV-261312r996406_rule
Medium
Description
Network interfaces in promiscuous mode allow for the capture of all network traffic visible to the system. If unauthorized individuals can access these applications, it may allow then to collect information such as logon IDs, passwords, and key exchanges between systems.
If the system is being used to perform a network troubleshooting function, the use of these tools must be documented with the information system security officer (ISSO) and restricted to only authorized personnel.