The network device must employ integrity verification tools to detect unauthorized changes to software and firmware used on the network device. Anomalous behavior and unauthorized changes must be detected before the network device is breached or no longer in service.
This requirement is usually fulfilled by installing a host-based integrity tool (e.g., HIDS) at the OS level on each device. The integrity software monitors and detects unauthorized changes to the network device application and the OS. However, since many network appliances are unable to run integrity software, other solutions such as periodic scanning or integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications are also acceptable. |