Skip to main content

💼 SI-7 Software, Firmware, and Information Integrity

Description

a. Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [Assignment: organization-defined software, firmware, and information]; and b. Take the following actions when unauthorized changes to the software, firmware, and information are detected: [Assignment: organization-defined actions].

Similar

  • Internal
    • ID: dec-c-98d1de8a

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 SI-7 Software, Firmware, and Information Integrity (M)(H)52
💼 NIST CSF v2.0 → 💼 DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events137
💼 NIST CSF v2.0 → 💼 ID.RA-09: The authenticity and integrity of hardware and software are assessed prior to acquisition and use4
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected117
💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected97
💼 NIST CSF v2.0 → 💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected111

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 SI-7(1) Software, Firmware, and Information Integrity _ Integrity Checks1
💼 SI-7(2) Software, Firmware, and Information Integrity _ Automated Notifications of Integrity Violations
💼 SI-7(3) Software, Firmware, and Information Integrity _ Centrally Managed Integrity Tools1
💼 SI-7(4) Software, Firmware, and Information Integrity _ Tamper-evident Packaging
💼 SI-7(5) Software, Firmware, and Information Integrity _ Automated Response to Integrity Violations
💼 SI-7(6) Software, Firmware, and Information Integrity _ Cryptographic Protection12
💼 SI-7(7) Software, Firmware, and Information Integrity _ Integration of Detection and Response1
💼 SI-7(8) Software, Firmware, and Information Integrity _ Auditing Capability for Significant Events8
💼 SI-7(9) Software, Firmware, and Information Integrity _ Verify Boot Process
💼 SI-7(10) Software, Firmware, and Information Integrity _ Protection of Boot Firmware
💼 SI-7(11) Software, Firmware, and Information Integrity _ Confined Environments with Limited Privileges
💼 SI-7(12) Software, Firmware, and Information Integrity _ Integrity Verification1921
💼 SI-7(13) Software, Firmware, and Information Integrity _ Code Execution in Protected Environments
💼 SI-7(14) Software, Firmware, and Information Integrity _ Binary or Machine Executable Code
💼 SI-7(15) Software, Firmware, and Information Integrity _ Code Authentication
💼 SI-7(16) Software, Firmware, and Information Integrity _ Time Limit on Process Execution Without Supervision
💼 SI-7(17) Software, Firmware, and Information Integrity _ Runtime Application Self-protection

Policies (1)

PolicyLogic CountFlags
📝 Google Cloud SQL Server Instance external scripts enabled Database Flag is not set to off 🟢1🟢 x6