UCF STIG Viewer Logo

The firewall implementation must detect unauthorized changes to software and information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37320 SRG-NET-000271-FW-000150 SV-49081r1_rule Medium
Description
The firewall implementation must employ integrity verification tools to detect unauthorized changes to software and firmware used on the firewall. Anomalous behavior and unauthorized changes must be detected before the firewall is breached or no longer in service. This requirement is usually fulfilled by installing a host-based integrity tool (e.g., HIDS) at the OS level on each device. The integrity software monitors and detects unauthorized changes to the firewall application and the OS. However, since many network appliances are unable to run integrity software, other solutions such as periodic scanning or integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications are also acceptable.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45568r1_chk )
If a HIDS is installed at the OS level of the firewall, this is not applicable.

Verify integrity verification tools to detect unauthorized changes to software and firmware are used to monitor the firewall application.

If the firewall implementation does not detect unauthorized changes to software and information, this is a finding.
Fix Text (F-42245r1_fix)
Configure the firewall implementation to detect unauthorized changes to software and information.