CM-14—Signed Components
>Control Description
Enterprises should verify that the acquired hardware and software components are genuine and valid by using digitally signed components from trusted certificate authorities. Verifying components before allowing installation helps enterprises reduce cybersecurity risks throughout the supply chain.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.