System and Information Integrity (SI)

Provide protection from malicious code at designated locations within organizational systems.


Login

System and Information Integrity (SI)

Monitor system security alerts and advisories and take action in response.


Login

System and Information Integrity (SI)

Update malicious code protection mechanisms when new releases are available.


Login

System and Information Integrity (SI)

Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.


Login

System and Information Integrity (SI)

Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.


Login

System and Information Integrity (SI)

Identify unauthorized use of organizational systems.


Login

System and Information Integrity (SI)

Verify the integrity of security critical and essential software using root of trust mechanisms or cryptographic signatures.


Login

System and Information Integrity (SI)

Ensure that specialized assets including IoT, IIoT, OT, GFE, Restricted Information Systems and test equipment are included in the scope of the specified enhanced security requirements or are segregated in purpose-specific networks.


Login

System and Information Integrity (SI)

Use threat indicator information and effective mitigations obtained from, at a minimum, open or commercial sources, and any DoD-provided sources, to guide and inform intrusion detection and threat hunting.


Login