800-53|SI-7(1)

Title

INTEGRITY CHECKS

Description

The information system performs an integrity check of [Assignment: organization-defined software, firmware, and information] [Selection (one or more): at startup; at [Assignment: organization-defined transitional states or security-relevant events]; [Assignment: organization-defined frequency]].

Supplemental

Security-relevant events include, for example, the identification of a new threat to which organizational information systems are susceptible, and the installation of new hardware, software, or firmware. Transitional states include, for example, system startup, restart, shutdown, and abort.

Reference Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

Parent Title: SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY

Family: SYSTEM AND INFORMATION INTEGRITY

Baseline Impact: MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.3.2 Ensure filesystem integrity is regularly checkedUnixCIS Amazon Linux v2.1.0 L1
1.3.2 Ensure filesystem integrity is regularly checkedUnixCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0
1.3.2 Ensure filesystem integrity is regularly checkedUnixCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0
2.27 Ensure 'Http Allowlist' Is Properly ConfiguredWindowsCIS Google Chrome L1 v3.0.0
3.22 (L1) Host must deny shell access for the dcui accountVMwareCIS VMware ESXi 8.0 v1.1.0 L1
4.12 Ensure all signed artifacts are validatedUnixCIS Docker v1.7.0 L1 Docker - Linux
5.1 Use secure RealmsUnixCIS Apache Tomcat 10 L2 v1.1.0 Middleware
5.1 Use secure RealmsUnixCIS Apache Tomcat 10 L2 v1.1.0
5.1.4 Minimize access to create podsOpenShiftCIS RedHat OpenShift Container Platform v1.6.0 L1
5.18 System Integrity Protection statusUnixCIS Apple OSX 10.11 El Capitan L1 v1.1.0
6.1.1 Audit system file permissionsUnixCIS Amazon Linux v2.1.0 L2
6.3 Ensure that server-side scripting is disabled if not neededUnixCIS MongoDB 3.6 L2 Unix Audit v1.1.0
6.3 Ensure that server-side scripting is disabled if not neededWindowsCIS MongoDB 3.6 L2 Windows Audit v1.1.0
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureUnixCIS Apache Tomcat 10 L1 v1.1.0
7.6 Ensure directory in logging.properties is a secure location - check application log directory is secureUnixCIS Apache Tomcat 10 L1 v1.1.0 Middleware
7.6 Ensure directory in logging.properties is a secure location - check log directory locationUnixCIS Apache Tomcat 10 L1 v1.1.0
7.6 Ensure directory in logging.properties is a secure location - check log directory locationUnixCIS Apache Tomcat 10 L1 v1.1.0 Middleware
7.6 Ensure directory in logging.properties is a secure location - check prefix application nameUnixCIS Apache Tomcat 10 L1 v1.1.0
7.6 Ensure directory in logging.properties is a secure location - check prefix application nameUnixCIS Apache Tomcat 10 L1 v1.1.0 Middleware
8.3.2 Implement Periodic Execution of File IntegrityUnixCIS Debian Linux 7 L2 v1.0.0
8.3.2 Implement Periodic Execution of File IntegrityUnixCIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0
9.2 Verify System File PermissionsUnixCIS Solaris 11.1 L1 v1.0.0
9.2 Verify System File PermissionsUnixCIS Solaris 11 L1 v1.1.0
10.12 Do not allow symbolic linkingUnixCIS Apache Tomcat 9 L1 v1.2.0 Middleware
10.12 Do not allow symbolic linkingUnixCIS Apache Tomcat 9 L1 v1.2.0
10.12 Do not allow symbolic linkingUnixCIS Apache Tomcat 10 L1 v1.1.0
10.12 Do not allow symbolic linkingUnixCIS Apache Tomcat 10 L1 v1.1.0 Middleware
10.12 Do not allow symbolic linkingUnixCIS Apache Tomcat 10.1 v1.0.0 L1
10.14 Do not allow cross context requestsUnixCIS Apache Tomcat 10 L1 v1.1.0
10.14 Do not allow cross context requestsUnixCIS Apache Tomcat 10 L1 v1.1.0 Middleware
10.14 Do not allow cross context requestsUnixCIS Apache Tomcat 10.1 v1.0.0 L1
10.14 Do not allow cross context requestsUnixCIS Apache Tomcat 9 L1 v1.2.0
10.14 Do not allow cross context requestsUnixCIS Apache Tomcat 9 L1 v1.2.0 Middleware
Audit system file permissions - dpkgUnixTenable Cisco Firepower Management Center OS Best Practices Audit
Audit system file permissions - rpmUnixTenable Cisco Firepower Management Center OS Best Practices Audit
Audit system file permissions - zypperUnixTenable Cisco Firepower Management Center OS Best Practices Audit
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Low
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersUnixNIST macOS Big Sur v1.4.0 - CNSSI 1253
Big Sur - Enable GatekeeperUnixNIST macOS Big Sur v1.4.0 - 800-53r5 Moderate
Big Sur - Enable GatekeeperUnixNIST macOS Big Sur v1.4.0 - 800-171
Big Sur - Enable GatekeeperUnixNIST macOS Big Sur v1.4.0 - 800-53r4 High
Big Sur - Enable GatekeeperUnixNIST macOS Big Sur v1.4.0 - 800-53r5 High
Big Sur - Enable GatekeeperUnixNIST macOS Big Sur v1.4.0 - All Profiles
Big Sur - Enable GatekeeperUnixNIST macOS Big Sur v1.4.0 - 800-53r4 Moderate