Under active development Content is continuously updated and improved

SI-7(15)Software, Firmware, And Information Integrity

Operational

>Control Description

SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY | CODE AUTHENTICATION The information system implements cryptographic mechanisms to authenticate organization-defined software or firmware components prior to installation.

>Supplemental Guidance

Cryptographic authentication includes, for example, verifying that software or firmware components have been digitally signed using certificates recognized and approved by organizations. Code signing is an effective method to protect against malicious code.

>Tailoring Guidance

This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all environments Consequently, inclusion in a departmental profile is made on a case by case basis.

Ask AI

Configure your API key to use AI features.