diff --git a/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml b/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml
index 2f59e77bb49e..48c41c6133ea 100644
--- a/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml
+++ b/linux_os/guide/system/software/integrity/endpoint_security_software/install_antivirus/rule.yml
@@ -5,14 +5,15 @@ prodtype: rhel6,rhel7,rhel8,fedora,rhv4
title: 'Install Virus Scanning Software'
description: |-
- Install virus scanning software, which uses signatures to search for the
- presence of viruses on the filesystem.
- Ensure virus definition files are no older than 7 days, or their last release.
-
- Configure the virus scanning software to perform scans dynamically on all
- accessed files. If this is not possible, configure the
- system to scan all altered files on the system on a daily
- basis. If the system processes inbound SMTP mail, configure the virus scanner
+ Virus scanning software can be used to protect a system from penetration from
+ computer viruses and to limit their spread through intermediate systems.
+
+ The virus scanning software should be configured to perform scans dynamically
+ on accessed files. If this capability is not available, the system must be
+ configured to scan, at a minimum, all altered files on the system on a daily
+ basis.
+
+ If the system processes inbound SMTP mail, the virus scanner must be configured
to scan all received mail.
rationale: |-
@@ -26,30 +27,23 @@ identifiers:
cce@rhel7: 27140-3
references:
- disa: 1239,1668
- nist: 'SC-28,SI-3'
+ disa: 366,1239,1668
+ nist: SC-28,SI-3,SI-3(1)(ii)
nist-csf: DE.CM-4,DE.DP-3,PR.DS-1
srg@rhel6: SRG-OS-00270
stigid@rhel6: "000284"
+ srg: SRG-OS-000480-GPOS-00227
+ stigid@rhel7: "032000"
isa-62443-2013: 'SR 3.2,SR 3.3,SR 3.4,SR 4.1'
isa-62443-2009: 4.3.4.3.8,4.4.3.2
cobit5: APO01.06,APO13.02,BAI02.01,BAI06.01,DSS04.07,DSS05.01,DSS05.02,DSS05.03,DSS06.06
iso27001-2013: A.12.2.1,A.14.2.8,A.8.2.3
cis-csc: 12,13,14,4,7,8
-ocil_clause: 'virus scanning software does not run continuously, or at least daily, or has signatures that are out of date'
+ocil_clause: 'there is no anti-virus solution installed on the system'
ocil: |-
- Inspect the system for a cron job or system service which executes
- a virus scanning tool regularly.
-
-
- To verify the McAfee VSEL system service is operational,
- run the following command:
-
$ sudo /sbin/service nails status-
$ sudo cd /opt/NAI/LinuxShield/engine/dat - $ sudo ls -la avvscan.dat avvnames.dat avvclean.dat+ Verify an anti-virus solution is installed on the system. The anti-virus solution may be + bundled with an approved host-based security solution. platform: machine diff --git a/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml b/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml index 1e66b6e56297..508d77398687 100644 --- a/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml +++ b/linux_os/guide/system/software/integrity/endpoint_security_software/install_hids/rule.yml @@ -46,9 +46,12 @@ ocil: |- warnings: - general: |- - Note in DoD environments, supplemental intrusion - detection tools, such as the McAfee Host-based Security System, are available - to integrate with existing infrastructure. When these supplemental tools - interfere with proper functioning of SELinux, SELinux takes precedence. + In DoD environments, supplemental intrusion detection and antivirus tools, + such as the McAfee Host-based Security System, are available to integrate with + existing infrastructure. Per DISA guidance, when these supplemental tools interfere + with proper functioning of SELinux, SELinux takes precedence. Should further + clarification be required, DISA contact information is published publicly at + https://iase.disa.mil/stigs/Pages/contact.aspx. platform: machine + diff --git a/rhel7/profiles/rhelh-stig.profile b/rhel7/profiles/rhelh-stig.profile index 57ade339d344..7eb5477ab99b 100644 --- a/rhel7/profiles/rhelh-stig.profile +++ b/rhel7/profiles/rhelh-stig.profile @@ -422,7 +422,6 @@ selections: - auditd_data_retention_space_left - audit_rules_execution_setfiles - audit_rules_kernel_module_loading_finit - - install_mcafee_antivirus - configure_firewalld_ports - package_openssh-server_installed - sshd_print_last_log diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile index ea490ef2ed88..17c1b15ee4a6 100644 --- a/rhel7/profiles/stig.profile +++ b/rhel7/profiles/stig.profile @@ -227,7 +227,7 @@ selections: - audit_rules_file_deletion_events_unlinkat - rsyslog_remote_loghost - rsyslog_nolisten - - install_mcafee_antivirus + - install_antivirus - accounts_max_concurrent_login_sessions - configure_firewalld_ports - sshd_use_approved_ciphers diff --git a/rhv4/profiles/rhvh-stig.profile b/rhv4/profiles/rhvh-stig.profile index ed1d815e0ef0..9f1e8648b49b 100644 --- a/rhv4/profiles/rhvh-stig.profile +++ b/rhv4/profiles/rhvh-stig.profile @@ -422,7 +422,6 @@ selections: - auditd_data_retention_space_left - audit_rules_execution_setfiles - audit_rules_kernel_module_loading_finit - - install_mcafee_antivirus - configure_firewalld_ports - package_openssh-server_installed - sshd_print_last_log