SI-15 Information Output Filtering

System and Information Integrity

Description

Validate information output from the following software programs and/or applications to ensure that the information is consistent with the expected content: [Assignment: organization-defined parameters].

Supplemental Guidance

Certain types of attacks, including SQL injections, produce output results that are unexpected or inconsistent with the output results that would be expected from software programs or applications. Information output filtering focuses on detecting extraneous content, preventing such extraneous content from being displayed, and then alerting monitoring tools that anomalous behavior has been discovered.

Changes from Rev 4

No significant title changes from Rev 4.

MITRE ATT&CK Techniques (42)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Persistence 3 Defense Evasion 9 Credential Access 7 Discovery 1 Lateral Movement 3 Collection 8 Command & Control 8 Exfiltration 5 Impact 8
Show all 42 techniques grouped by tactic

Compliance Mappings

COBIT 2019

DSS06

RBI CSF

Annex1.6

CBUAE

CR-6

CBE CSF

CTO-4

SA JS2

JS2-SA

BoG CISD

CISD-SDLC

BCBS 239

Principle 3Principle 7Principle 9

PRA SS1/23

P3.2

HITRUST CSF v11

10.b

Basel SCO60

SCO60.70SCO60.72