CM-7(6)—Confined Environments With Limited Privileges
>Control Description
The enterprise should ensure that code authentication mechanisms such as digital signatures are implemented when executing code to assure the integrity of software, firmware, and information on the information systems and networks.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.