Implement cryptographic mechanisms to authenticate the following software or firmware components prior to installation: [Assignment: organization-defined software or firmware components].
Implement cryptographic mechanisms to authenticate the following software or firmware components prior to installation: [Assignment: organization-defined software or firmware components].
Prohibit processes from executing without supervision for more than [Assignment: organization-defined time period].
Implement [Assignment: organization-defined controls] for application self-protection at runtime.
a. Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and b. Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
[Withdrawn: Incorporated into SR-9.]
Automatically update spam protection mechanisms [Assignment: organization-defined frequency].
Implement spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
[Withdrawn: Incorporated into PL-9.]
Check the validity of the following information inputs: [Assignment: organization-defined information inputs to the system].
(a) Provide a manual override capability for input validation of the following information inputs: [Assignment: organization-defined inputs defined in the base control (SI-10)]; (b) Restrict the use of the manual override capability to only [Assignment: organization-defined authorized individuals]; and (c) Audit the use of the manual override capability.