Description
The information system implements cryptographic mechanisms to authenticate [Assignment: organization-defined software or firmware components] prior to installation.
Supplemental
Cryptographic authentication includes, for example, verifying that software or firmware components have been digitally signed using certificates recognized and approved by organizations. Code signing is an effective method to protect against malicious code.
Reference Item Details
Category: SYSTEM AND INFORMATION INTEGRITY
Parent Title: SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY
Family: SYSTEM AND INFORMATION INTEGRITY