3.14 — System and Information Integrity
26 requirements in the System and Information Integrity family
3.14.1Flaw Remediation Assessment
3.14.1[a]Flaw Remediation Assessment [a]
3.14.1[b]Flaw Remediation Assessment [b]
3.14.1[c]Flaw Remediation Assessment [c]
3.14.1[d]Flaw Remediation Assessment [d]
3.14.1[e]Flaw Remediation Assessment [e]
3.14.1[f]Flaw Remediation Assessment [f]
3.14.2Malicious Code Protection Assessment
3.14.2[a]Malicious Code Protection Assessment [a]
3.14.2[b]Malicious Code Protection Assessment [b]
3.14.3Security Alert Monitoring Assessment
3.14.3[a]Security Alert Monitoring Assessment [a]
3.14.3[b]Security Alert Monitoring Assessment [b]
3.14.3[c]Security Alert Monitoring Assessment [c]
3.14.4Update Malicious Code Protection Assessment
3.14.5System and File Scanning Assessment
3.14.5[a]System and File Scanning Assessment [a]
3.14.5[b]System and File Scanning Assessment [b]
3.14.5[c]System and File Scanning Assessment [c]
3.14.6Monitor Communications for Attacks Assessment
3.14.6[a]Monitor Communications for Attacks Assessment [a]
3.14.6[b]Monitor Communications for Attacks Assessment [b]
3.14.6[c]Monitor Communications for Attacks Assessment [c]
3.14.7Identify Unauthorized Use Assessment
3.14.7[a]Identify Unauthorized Use Assessment [a]
3.14.7[b]Identify Unauthorized Use Assessment [b]