Skip to main content

πŸ’Ό SI-7 Software, Firmware, and Information Integrity

  • Contextual name: πŸ’Ό SI-7 Software, Firmware, and Information Integrity
  • ID: /frameworks/nist-sp-800-53-r5/si/07
  • Located in: πŸ’Ό SI System And Information Integrity

Description​

a. Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [Assignment: organization-defined software, firmware, and information]; and b. Take the following actions when unauthorized changes to the software, firmware, and information are detected: [Assignment: organization-defined actions].

Similar​

  • Internal
    • ID: dec-c-98d1de8a

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-7 Software, Firmware, and Information Integrity (M)(H)51
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events89
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.RA-09: The authenticity and integrity of hardware and software are assessed prior to acquisition and use
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected82
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected69
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected67

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SI-7(1) Software, Firmware, and Information Integrity _ Integrity Checks1
πŸ’Ό SI-7(2) Software, Firmware, and Information Integrity _ Automated Notifications of Integrity Violations
πŸ’Ό SI-7(3) Software, Firmware, and Information Integrity _ Centrally Managed Integrity Tools1
πŸ’Ό SI-7(4) Software, Firmware, and Information Integrity _ Tamper-evident Packaging
πŸ’Ό SI-7(5) Software, Firmware, and Information Integrity _ Automated Response to Integrity Violations
πŸ’Ό SI-7(6) Software, Firmware, and Information Integrity _ Cryptographic Protection6
πŸ’Ό SI-7(7) Software, Firmware, and Information Integrity _ Integration of Detection and Response1
πŸ’Ό SI-7(8) Software, Firmware, and Information Integrity _ Auditing Capability for Significant Events6
πŸ’Ό SI-7(9) Software, Firmware, and Information Integrity _ Verify Boot Process
πŸ’Ό SI-7(10) Software, Firmware, and Information Integrity _ Protection of Boot Firmware
πŸ’Ό SI-7(11) Software, Firmware, and Information Integrity _ Confined Environments with Limited Privileges
πŸ’Ό SI-7(12) Software, Firmware, and Information Integrity _ Integrity Verification1820
πŸ’Ό SI-7(13) Software, Firmware, and Information Integrity _ Code Execution in Protected Environments
πŸ’Ό SI-7(14) Software, Firmware, and Information Integrity _ Binary or Machine Executable Code
πŸ’Ό SI-7(15) Software, Firmware, and Information Integrity _ Code Authentication
πŸ’Ό SI-7(16) Software, Firmware, and Information Integrity _ Time Limit on Process Execution Without Supervision
πŸ’Ό SI-7(17) Software, Firmware, and Information Integrity _ Runtime Application Self-protection