UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
RHEL-06-000457-PNF RHEL-06-000457-PNF RHEL-06-000457-PNF_rule Medium
Description
Malicious code protection software must be protected so as to prevent a non-privileged user or a malicious piece of software from disabling the protection mechanism. A common tactic of malware is to identify the type of malicious code protection software running on the system and deactivate it.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2013-02-05

Details

Check Text ( C-RHEL-06-000457-PNF_chk )
RHEL6 supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-RHEL-06-000457-PNF_fix)
This requirement is a permanent not a finding. No fix is required.