Manage the integrity of critical files
Summary
The system must verify and log changes in the integrity of critical system files.
Description
The integrity of critical files needs to be safeguarded against malicious tampering or unauthorized modifications. If an attacker successfully alters critical files, it could lead to data breaches, or the injection of malicious code into the system.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References
- CAPEC™-13. Subverting environment variable values
- CAPEC™-23. File content injection
- CAPEC™-35. Leverage executable code in non-executable files
- CAPEC™-38. Leveraging/Manipulating configuration file search paths
- CAPEC™-154. Resource location spoofing
- CAPEC™-176. Configuration/Environment manipulation
- OWASP TOP 10-A9. Security logging and monitoring failures
- OWASP-M TOP 10-M2. Insecure data storage
- CERT-J-FIO00-J. Do not operate on files in shared directories
- NY SHIELD Act-5575_B_6. Personal and private information
- MITRE ATT&CK®-M1025. Privileged process integrity
- PA-DSS-4_2_2. Actions taken by any individual with root or administrative privileges
- PA-DSS-4_2_6. Initialization, stopping, or pausing of the application audit logs
- PDPA-9B_48E. Improper use of personal data
- ISA/IEC 62443-SI-3_1. Communication integrity
- NIST SSDF-PS_2_1. Provide a mechanism for verifying software release integrity
- NIST SSDF-PS_3_1. Archive and protect each software release
- ISSAF-Y_3_4. Database Security - Database services countermeasures
- HITRUST CSF-09_ac. Protection of log information
- HITRUST CSF-09_ad. Administrator and operator logs
- CASA-8_1_6. General Data Protection
- OWASP MASVS-RESILIENCE-1. Cryptography requirementsThe app validates the integrity of the platform
- NIST CSF-RS_AN-07. Incident data and metadata are collected, and their integrity and provenance are preserved
Vulnerabilities
free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.