diff --git a/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml b/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml index 2f59e77bb49e..48c41c6133ea 100644 --- a/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml +++ b/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml @@ -5,14 +5,15 @@ prodtype: rhel6,rhel7,rhel8,fedora,rhv4 title: 'Install Virus Scanning Software' description: |- - Install virus scanning software, which uses signatures to search for the - presence of viruses on the filesystem. - Ensure virus definition files are no older than 7 days, or their last release. - - Configure the virus scanning software to perform scans dynamically on all - accessed files. If this is not possible, configure the - system to scan all altered files on the system on a daily - basis. If the system processes inbound SMTP mail, configure the virus scanner + Virus scanning software can be used to protect a system from penetration from + computer viruses and to limit their spread through intermediate systems. + + The virus scanning software should be configured to perform scans dynamically + on accessed files. If this capability is not available, the system must be + configured to scan, at a minimum, all altered files on the system on a daily + basis. + + If the system processes inbound SMTP mail, the virus scanner must be configured to scan all received mail. rationale: |- @@ -26,30 +27,23 @@ identifiers: cce@rhel7: 27140-3 references: - disa: 1239,1668 - nist: 'SC-28,SI-3' + disa: 366,1239,1668 + nist: SC-28,SI-3,SI-3(1)(ii) nist-csf: DE.CM-4,DE.DP-3,PR.DS-1 srg@rhel6: SRG-OS-00270 stigid@rhel6: "000284" + srg: SRG-OS-000480-GPOS-00227 + stigid@rhel7: "032000" isa-62443-2013: 'SR 3.2,SR 3.3,SR 3.4,SR 4.1' isa-62443-2009: 4.3.4.3.8,4.4.3.2 cobit5: APO01.06,APO13.02,BAI02.01,BAI06.01,DSS04.07,DSS05.01,DSS05.02,DSS05.03,DSS06.06 iso27001-2013: A.12.2.1,A.14.2.8,A.8.2.3 cis-csc: 12,13,14,4,7,8 -ocil_clause: 'virus scanning software does not run continuously, or at least daily, or has signatures that are out of date' +ocil_clause: 'there is no anti-virus solution installed on the system' ocil: |- - Inspect the system for a cron job or system service which executes - a virus scanning tool regularly. -
- - To verify the McAfee VSEL system service is operational, - run the following command: -
$ sudo /sbin/service nails status
-
- To check on the age of uvscan virus definition files, run the following command: -
$ sudo cd /opt/NAI/LinuxShield/engine/dat
-    $ sudo ls -la avvscan.dat avvnames.dat avvclean.dat
+ Verify an anti-virus solution is installed on the system. The anti-virus solution may be + bundled with an approved host-based security solution. platform: machine diff --git a/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml b/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml index 1e66b6e56297..508d77398687 100644 --- a/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml +++ b/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml @@ -46,9 +46,12 @@ ocil: |- warnings: - general: |- - Note in DoD environments, supplemental intrusion - detection tools, such as the McAfee Host-based Security System, are available - to integrate with existing infrastructure. When these supplemental tools - interfere with proper functioning of SELinux, SELinux takes precedence. + In DoD environments, supplemental intrusion detection and antivirus tools, + such as the McAfee Host-based Security System, are available to integrate with + existing infrastructure. Per DISA guidance, when these supplemental tools interfere + with proper functioning of SELinux, SELinux takes precedence. Should further + clarification be required, DISA contact information is published publicly at + https://iase.disa.mil/stigs/Pages/contact.aspx. platform: machine + diff --git a/rhel7/profiles/rhelh-stig.profile b/rhel7/profiles/rhelh-stig.profile index 57ade339d344..7eb5477ab99b 100644 --- a/rhel7/profiles/rhelh-stig.profile +++ b/rhel7/profiles/rhelh-stig.profile @@ -422,7 +422,6 @@ selections: - auditd_data_retention_space_left - audit_rules_execution_setfiles - audit_rules_kernel_module_loading_finit - - install_mcafee_antivirus - configure_firewalld_ports - package_openssh-server_installed - sshd_print_last_log diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile index ea490ef2ed88..17c1b15ee4a6 100644 --- a/rhel7/profiles/stig.profile +++ b/rhel7/profiles/stig.profile @@ -227,7 +227,7 @@ selections: - audit_rules_file_deletion_events_unlinkat - rsyslog_remote_loghost - rsyslog_nolisten - - install_mcafee_antivirus + - install_antivirus - accounts_max_concurrent_login_sessions - configure_firewalld_ports - sshd_use_approved_ciphers diff --git a/rhv4/profiles/rhvh-stig.profile b/rhv4/profiles/rhvh-stig.profile index ed1d815e0ef0..9f1e8648b49b 100644 --- a/rhv4/profiles/rhvh-stig.profile +++ b/rhv4/profiles/rhvh-stig.profile @@ -422,7 +422,6 @@ selections: - auditd_data_retention_space_left - audit_rules_execution_setfiles - audit_rules_kernel_module_loading_finit - - install_mcafee_antivirus - configure_firewalld_ports - package_openssh-server_installed - sshd_print_last_log