SI-07 Software And Information Integrity

System and Information Integrity

Low Moderate High

Description

The information system detects and protects against unauthorized changes to software and information.\n

Supplemental Guidance

The organization employs integrity verification applications on the information system to look for evidence of information tampering, errors, and omissions. The organization employs good software engineering practices with regard to commercial off-the-shelf integrity mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and uses tools to automatically monitor the integrity of the information system and the applications it hosts.\n

Changes from Rev 4

Control text adds requirement to take actions when unauthorized changes are detected Parameter added for specifying organization-defined actions Discussion includes additional examples

Enhancements

\n

Compliance Mappings

NIST CSF 2.0

DE.CM-09

SOC 2 TSC

CC6.6CC6.6-POF2CC6.8CC7.1-POF2CC7.1-POF3CC7.1-POF4PI1.2-POF1PI1.2-POF2PI1.2-POF3

ISO 17799 (legacy)

12.2.112.2.212.2.4

COBIT 4.1 (legacy)

PO2.4AI2.4DS5.9