UCF STIG Viewer Logo

Malicious code protection applications must update malicious code protection mechanisms only when directed by a privileged user.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27075 SRG-APP-000274 SV-34370r1_rule Medium
Description
Malicious code protection software must be protected to prevent a non-privileged user or malicious piece of software from manipulating the protection update mechanism. Malicious code includes, viruses, worms, Trojan horses, and Spyware.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None