Skip to main content

πŸ’Ό SI-7 SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY

  • Contextual name: πŸ’Ό SI-7 SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY
  • ID: /frameworks/nist-sp-800-53-r4/si/07
  • Located in: πŸ’Ό SI SYSTEM AND INFORMATION INTEGRITY

Description​

The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].

Similar​

  • Internal
    • ID: dec-c-f52e898e

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity2226
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SI-7 (1) INTEGRITY CHECKS
πŸ’Ό SI-7 (2) AUTOMATED NOTIFICATIONS OF INTEGRITY VIOLATIONS
πŸ’Ό SI-7 (3) CENTRALLY-MANAGED INTEGRITY TOOLS
πŸ’Ό SI-7 (4) TAMPER-EVIDENT PACKAGING
πŸ’Ό SI-7 (5) AUTOMATED RESPONSE TO INTEGRITY VIOLATIONS
πŸ’Ό SI-7 (6) CRYPTOGRAPHIC PROTECTION
πŸ’Ό SI-7 (7) INTEGRATION OF DETECTION AND RESPONSE
πŸ’Ό SI-7 (8) AUDITING CAPABILITY FOR SIGNIFICANT EVENTS
πŸ’Ό SI-7 (9) VERIFY BOOT PROCESS
πŸ’Ό SI-7 (10) PROTECTION OF BOOT FIRMWARE
πŸ’Ό SI-7 (11) CONFINED ENVIRONMENTS WITH LIMITED PRIVILEGES
πŸ’Ό SI-7 (12) INTEGRITY VERIFICATION
πŸ’Ό SI-7 (13) CODE EXECUTION IN PROTECTED ENVIRONMENTS
πŸ’Ό SI-7 (14) BINARY OR MACHINE EXECUTABLE CODE
πŸ’Ό SI-7 (15) CODE AUTHENTICATION
πŸ’Ό SI-7 (16) TIME LIMIT ON PROCESS EXECUTION W_O SUPERVISION