Automatically [Selection (one or more): shut the system down; restart the system; implement [Assignment: organization-defined controls]] when integrity violations are discovered.
Automatically [Selection (one or more): shut the system down; restart the system; implement [Assignment: organization-defined controls]] when integrity violations are discovered.
Implement cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.
Incorporate the detection of the following unauthorized changes into the organizational incident response capability: [Assignment: organization-defined security-relevant changes to the system].
Upon detection of a potential integrity violation, provide the capability to audit the event and initiate the following actions: [Selection (one or more): generate an audit record; alert current user; alert [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined other actions]].
Verify the integrity of the boot process of the following system components: [Assignment: organization-defined system components].
Implement the following mechanisms to protect the integrity of boot firmware in [Assignment: organization-defined system components]: [Assignment: organization-defined mechanisms].
[Withdrawn: Moved to CM-7(6).]
Require that the integrity of the following user-installed software be verified prior to execution: [Assignment: organization-defined user-installed software].
[Withdrawn: Moved to CM-7(7).]
[Withdrawn: Moved to CM-7(8).]