Under active development Content is continuously updated and improved

SI-7(7)Software, Firmware, And Information Integrity

PBMM (P2)
Secret (P2)
Operational

>Control Description

SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY | INTEGRATION OF DETECTION AND RESPONSE The organization incorporates the detection of unauthorized organization-defined security-relevant changes to the information system into the organizational incident response capability.

>Supplemental Guidance

This control enhancement helps to ensure that detected events are tracked, monitored, corrected, and available for historical purposes. Maintaining historical records is important both for being able to identify and discern adversary actions over an extended period of time and for possible legal actions. Security-relevant changes include, for example, unauthorized changes to established configuration settings or unauthorized elevation of information system privileges.

Related controls: IR-4, IR-5, SI-4.

Ask AI

Configure your API key to use AI features.