<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Antivirus on Linux in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3136#M322</link>
    <description>&lt;P&gt;I am probably the least Linux expert I know, however, are they no longer taking the "commonly affected" exception?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also hear from the Linux experts, the file systems can be very locked down to only allowed processes (third-party tools will do this also) and you may be able to convince the auditors with evidence from that standpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All that aside, I believe you should find a product which will work for your organization to reduce the risk but I believe there is likely significant overhead to setup, manage exclusions and monitor the environment. In the end, the organization should make a decision, sign-off and have it agreed to by the QSA.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 01 Nov 2017 15:23:22 GMT</pubDate>
    <dc:creator>kevinwatkins</dc:creator>
    <dc:date>2017-11-01T15:23:22Z</dc:date>
    <item>
      <title>Antivirus on Linux</title>
      <link>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3130#M319</link>
      <description>&lt;P&gt;All PCI, HITRUST, etc. auditors that I have encountered, require antivirus running on Linux systems.&amp;nbsp; Many folks outside of the auditing community feel Linux does not need antivirus and that this is just a checkbox. It seems without some sort of antivirus running on Linux, you will not pass the audits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anyone out there that has passed the various audits without having antivirus running on a Linux system and if so, what justification did you use that convinced PCI, HITRUST, and others to accept your reasoning?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note:&amp;nbsp; My organization runs ClamAV but there is no central management and according to some, it places quite a load on the servers when scanning. What antivirus solutions for Linux are others successful with?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 13:20:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3130#M319</guid>
      <dc:creator>bremboabc</dc:creator>
      <dc:date>2017-11-01T13:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Antivirus on Linux</title>
      <link>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3133#M320</link>
      <description>&lt;P&gt;For us, in a Hospital environment, we do not have a CDE as we don't store, process or transmit credit card data.&amp;nbsp; However, I'm on my 4th QSA and so far, all of them are adamant about using AV regardless of server OS &amp;amp; functionality.&amp;nbsp;&amp;nbsp;Also, as a mandated requirement, you'd be hard pressed to convince many not to run AV on Linux.&amp;nbsp;&amp;nbsp; I have indeed seen Malware and Viruses on Linux and would agree you should protect your servers accordingly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ClamAV does have a heavier footprint in memory than it should.&amp;nbsp; I run Linux on all my laptops at home and have found SophosAV to be an excellent replacement for ClamAv.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Found it easier to use update and scan my systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gerry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 14:38:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3133#M320</guid>
      <dc:creator>donofry</dc:creator>
      <dc:date>2017-11-01T14:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Antivirus on Linux</title>
      <link>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3136#M322</link>
      <description>&lt;P&gt;I am probably the least Linux expert I know, however, are they no longer taking the "commonly affected" exception?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also hear from the Linux experts, the file systems can be very locked down to only allowed processes (third-party tools will do this also) and you may be able to convince the auditors with evidence from that standpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All that aside, I believe you should find a product which will work for your organization to reduce the risk but I believe there is likely significant overhead to setup, manage exclusions and monitor the environment. In the end, the organization should make a decision, sign-off and have it agreed to by the QSA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 15:23:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3136#M322</guid>
      <dc:creator>kevinwatkins</dc:creator>
      <dc:date>2017-11-01T15:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Antivirus on Linux</title>
      <link>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3170#M325</link>
      <description>&lt;P&gt;It's a great question. I've never had to deal with PCI personally, but was surprised to hear that AV on Linux/Unix systems is a requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Surely a well patched, configured and hardened Linux server behind the normal network protections, (Firewall, IPS, etc), with log monitoring and regular vulnerability scanning in place would be enough.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does an AV really give you much in addition on Linux? Feels to me like box checking on the part of your QSA.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 21:21:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3170#M325</guid>
      <dc:creator>TonyDS</dc:creator>
      <dc:date>2017-11-01T21:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Antivirus on Linux</title>
      <link>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3226#M330</link>
      <description>&lt;P&gt;If you serve files/documents it is a good idea - I wouldn't want to be the source of a virus to your network/enterprise.&amp;nbsp; To minimize the CPU hit&amp;nbsp;I would scan new files as soon as practical and all files on a regular schedule during off hours - to catch viruses whose signatures didn't exist during the initial scan.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2017 14:48:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Antivirus-on-Linux/m-p/3226#M330</guid>
      <dc:creator>VTSalas</dc:creator>
      <dc:date>2017-11-02T14:48:02Z</dc:date>
    </item>
  </channel>
</rss>

