Skip to main content

๐Ÿ’ผ CC6.8-2 Detects Unauthorized Changes to Software and Configuration Parameters

Descriptionโ€‹

Processes are in place to detect changes to software and configuration parameters that may be indicative of unauthorized or malicious software.

Similarโ€‹

  • Internal
    • ID: dec-c-f2b40232

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags