System and Information Integrity (SI)

Implement cryptographic mechanisms to authenticate the following software or firmware components prior to installation: [Assignment: organization-defined software or firmware components].


Login

System and Information Integrity (SI)

Prohibit processes from executing without supervision for more than [Assignment: organization-defined time period].


Login

System and Information Integrity (SI)

Implement [Assignment: organization-defined controls] for application self-protection at runtime.


Login

System and Information Integrity (SI)

Level N/A

a. Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and b. Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.


Login

System and Information Integrity (SI)

[Withdrawn: Incorporated into SR-9.]


Login

System and Information Integrity (SI)

Automatically update spam protection mechanisms [Assignment: organization-defined frequency].


Login

System and Information Integrity (SI)

Implement spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.


Login

System and Information Integrity (SI)

[Withdrawn: Incorporated into PL-9.]


Login

System and Information Integrity (SI)

Check the validity of the following information inputs: [Assignment: organization-defined information inputs to the system].


Login

System and Information Integrity (SI)

(a) Provide a manual override capability for input validation of the following information inputs: [Assignment: organization-defined inputs defined in the base control (SI-10)]; (b) Restrict the use of the manual override capability to only [Assignment: organization-defined authorized individuals]; and (c) Audit the use of the manual override capability.


Login