Title
SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY
Description
The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].
Supplemental
Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). Software includes, for example, operating systems (with key internal components such as kernels, drivers), middleware, and applications. Firmware includes, for example, the Basic Input Output System (BIOS). Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications.
Reference Item Details
Related: SA-12,SC-13,SC-8,SI-3
Category: SYSTEM AND INFORMATION INTEGRITY
Family: SYSTEM AND INFORMATION INTEGRITY
Baseline Impact: MODERATE,HIGH