800-53|SI-7

Title

SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY

Description

The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].

Supplemental

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). Software includes, for example, operating systems (with key internal components such as kernels, drivers), middleware, and applications. Firmware includes, for example, the Basic Input Output System (BIOS). Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications.

Reference Item Details

Related: SA-12,SC-13,SC-8,SI-3

Category: SYSTEM AND INFORMATION INTEGRITY

Family: SYSTEM AND INFORMATION INTEGRITY

Priority: P1

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.0 - The file permissions, ownership, and group membership of system files and commands must match the vendor values.UnixTenable Fedora Linux Best Practices v2.0.0
1.1.1.2.1.17 Set 'System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies' to 'Enabled'WindowsCIS Windows 2003 MS v3.1.0
1.1.1.2.1.17 Set 'System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies' to 'Enabled'WindowsCIS Windows 2003 DC v3.1.0
1.1.3.2.2 Ensure 'Require that application add-ins are signed by Trusted Publisher' is set to EnabledWindowsCIS Microsoft Office Access 2013 v1.0.1
1.1.3.2.2 Ensure 'Require that application add-ins are signed by Trusted Publisher' is set to EnabledWindowsCIS Microsoft Office Access 2016 v1.0.1
1.1.3.17.9 Set 'User Account Control: Only elevate executables that are signed and validated' to 'Disabled'WindowsCIS Windows 8 L1 v1.0.0
1.1.11 - /etc/security/login.cfg - 'pwd_algorithm = ssha256 (AIX 5.3 TL7+ only)'UnixCIS AIX 5.3/6.1 L2 v1.1.0
1.2 - The cryptographic hash of system files and commands must match vendor values.UnixTenable Fedora Linux Best Practices v2.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS Oracle Linux 8 Server L1 v1.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS Oracle Linux 7 Workstation L1 v3.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS SUSE Linux Enterprise 15 Workstation L1 v1.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS Oracle Linux 8 Workstation L1 v1.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS CentOS Linux 8 Workstation L1 v1.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS CentOS Linux 8 Server L1 v1.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS SUSE Linux Enterprise 15 Server L1 v1.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS Red Hat EL7 Workstation L1 v3.0.1
1.2.1 Ensure GPG keys are configuredUnixCIS Oracle Linux 7 Server L1 v3.0.0
1.2.1 Ensure GPG keys are configuredUnixCIS Red Hat EL7 Server L1 v3.0.1
1.2.1 Restrict Access to VTY SessionsCiscoCIS Cisco NX-OS L1 v1.1.0
1.2.1 Use an EFI passwordUnixCIS Apple OSX 10.6 Snow Leopard L2 v1.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS Debian 9 Workstation L1 v1.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS Amazon Linux v2.1.0 L1
1.2.2 Ensure GPG keys are configuredUnixCIS Oracle Linux 6 Workstation L1 v1.1.0
1.2.2 Ensure GPG keys are configuredUnixHuawei EulerOS 2 Workstation L1 v1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS SUSE Linux Enterprise Server 11 L1 v2.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS Debian 9 Server L1 v1.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 16.04 LTS Workstation L1 v1.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS Debian 8 Server L1 v2.0.1
1.2.2 Ensure GPG keys are configuredUnixCIS CentOS 6 Workstation L1 v2.1.0
1.2.2 Ensure GPG keys are configuredUnixHuawei EulerOS 2 Server L1 v1.0
1.2.2 Ensure GPG keys are configuredUnixCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS Debian 8 Workstation L1 v2.0.1
1.2.2 Ensure GPG keys are configuredUnixCIS CentOS 6 Server L1 v2.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Amazon Linux 2 v1.0.0 L1
1.2.2 Ensure GPG keys are configuredUnixCIS Amazon Linux v2.0.0 L1
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0
1.2.2 Ensure GPG keys are configuredUnixCIS SUSE Linux Enterprise Server 12 L1 v2.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Oracle Linux 6 Server L1 v1.1.0
1.2.2 Ensure GPG keys are configuredUnixCIS Ubuntu Linux 16.04 LTS Server L1 v1.1.0
1.2.2 Ensure GPG keys are configured - apt-key listUnixCIS Distribution Independent Linux Workstation L1 v1.1.0
1.2.2 Ensure GPG keys are configured - apt-key listUnixCIS Distribution Independent Linux Server L1 v1.1.0
1.2.2 Ensure GPG keys are configured - yumUnixCIS Distribution Independent Linux Server L1 v1.1.0