SI-18—Personally Identifiable Information Quality Operations
>Control Description
Check the accuracy, relevance, timeliness, and completeness of personally identifiable information across the information life cycle ⚙organization-defined frequency; and
Correct or delete inaccurate or outdated personally identifiable information.
>Control Enhancements(5)
>Cross-Framework Mappings
NIST CSF 2.0
via NIST CSF 2.0 Concept Crosswalk>Supplemental Guidance
Personally identifiable information quality operations include the steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information life cycle. The information life cycle includes the creation, collection, use, processing, storage, maintenance, dissemination, disclosure, and disposal of personally identifiable information. Personally identifiable information quality operations include editing and validating addresses as they are collected or entered into systems using automated address verification look-up application programming interfaces.
Checking personally identifiable information quality includes the tracking of updates or changes to data over time, which enables organizations to know how and what personally identifiable information was changed should erroneous information be identified. The measures taken to protect personally identifiable information quality are based on the nature and context of the personally identifiable information, how it is to be used, how it was obtained, and the potential de-identification methods employed. The measures taken to validate the accuracy of personally identifiable information used to make determinations about the rights, benefits, or privileges of individuals covered under federal programs may be more comprehensive than the measures used to validate personally identifiable information used for less sensitive purposes.
>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies and procedures govern personally identifiable information quality operations?
- •Who is responsible for monitoring system and information integrity?
- •How frequently are integrity monitoring processes reviewed and updated?
- •What is your patch management process and timeline?
Technical Implementation:
- •What technical controls detect and respond to personally identifiable information quality operations issues?
- •How are integrity violations identified and reported?
- •What automated tools support system and information integrity monitoring?
- •How do you ensure timely installation of security-relevant patches?
Evidence & Documentation:
- •Can you provide recent integrity monitoring reports or alerts?
- •What logs demonstrate that SI-18 is actively implemented?
- •Where is evidence of integrity monitoring maintained and for how long?
- •Can you show recent patch installation records?
Ask AI
Configure your API key to use AI features.