Title
PROTECTION OF BOOT FIRMWARE
Description
The information system implements [Assignment: organization-defined security safeguards] to protect the integrity of boot firmware in [Assignment: organization-defined devices].
Supplemental
Unauthorized modifications to boot firmware may be indicative of a sophisticated, targeted cyber attack. These types of cyber attacks can result in a permanent denial of service (e.g., if the firmware is corrupted) or a persistent malicious code presence (e.g., if code is embedded within the firmware). Devices can protect the integrity of the boot firmware in organizational information systems by: (i) verifying the integrity and authenticity of all updates to the boot firmware prior to applying changes to the boot devices; and (ii) preventing unauthorized processes from modifying the boot firmware.
Reference Item Details
Category: SYSTEM AND INFORMATION INTEGRITY
Parent Title: SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY
Family: SYSTEM AND INFORMATION INTEGRITY