FGFW-ND-000305 - The FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Changes to any software components can have significant effects on the overall security of the network device. Verifying software components have been digitally signed or hashed ensures that the software has not been tampered with and has been provided by a trusted vendor.

Accordingly, patches, service packs, or application components must be signed with a certificate or verified with an integrity hash provided by the vendor.

Verifying the authenticity of the software prior to installation validates the integrity of the patch or upgrade received from a vendor. This ensures the software has not been tampered with and has been provided by a trusted vendor.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Administrators can download software directly from a FortiGuard or FortiManager server. These servers are authenticated using digital certificates that ensure identity and non-repudiation of the source packages. This is a preferred method of applying updates.

The Administrator can also download the software from Fortinet's support website portal. The website includes a file checksum to verify file integrity prior to uploading.

Develop a process to download the update files from the Fortinet website, and manually compare the download hash to the hash value provided on the vendor site before applying the update files to the system.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_FN_FortiGate_Firewall_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001749, Rule-ID|SV-234220r628777_rule, STIG-ID|FGFW-ND-000305, Vuln-ID|V-234220

Plugin: FortiGate

Control ID: e3cc3d5ea737e4aa15f5f07e186afb69ecdcd2f20c65e9e82228a612d6310934