Skip to main content

💼 SI-7 SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY

  • Contextual name: 💼 SI-7 SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY
  • ID: /frameworks/nist-sp-800-53-r4/si/07
  • Located in: 💼 SI SYSTEM AND INFORMATION INTEGRITY

Description​

The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].

Similar​

  • Internal
    • ID: dec-c-f52e898e

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST CSF v1.1 → 💼 PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity2226
💼 NIST CSF v1.1 → 💼 PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 SI-7 (1) INTEGRITY CHECKS
💼 SI-7 (2) AUTOMATED NOTIFICATIONS OF INTEGRITY VIOLATIONS
💼 SI-7 (3) CENTRALLY-MANAGED INTEGRITY TOOLS
💼 SI-7 (4) TAMPER-EVIDENT PACKAGING
💼 SI-7 (5) AUTOMATED RESPONSE TO INTEGRITY VIOLATIONS
💼 SI-7 (6) CRYPTOGRAPHIC PROTECTION
💼 SI-7 (7) INTEGRATION OF DETECTION AND RESPONSE
💼 SI-7 (8) AUDITING CAPABILITY FOR SIGNIFICANT EVENTS
💼 SI-7 (9) VERIFY BOOT PROCESS
💼 SI-7 (10) PROTECTION OF BOOT FIRMWARE
💼 SI-7 (11) CONFINED ENVIRONMENTS WITH LIMITED PRIVILEGES
💼 SI-7 (12) INTEGRITY VERIFICATION
💼 SI-7 (13) CODE EXECUTION IN PROTECTED ENVIRONMENTS
💼 SI-7 (14) BINARY OR MACHINE EXECUTABLE CODE
💼 SI-7 (15) CODE AUTHENTICATION
💼 SI-7 (16) TIME LIMIT ON PROCESS EXECUTION W_O SUPERVISION