SI-7(8) SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY | AUDITING CAPABILITY FOR SIGNIFICANT EVENTS |
Scroll Prev Top Next More |
Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
si-7(8) |
software, firmware, and information integrity | auditing capability for significant events |
|||
|
assessment objective: Determine if: |
|||
si-7(8)[1] |
the organization defines personnel or roles to be alerted upon detection of a potential integrity violation; |
|||
si-7(8)[2] |
the organization defines other actions to be taken upon detection of a potential integrity violation; |
|||
si-7(8)[3] |
si-7(8)[3][a] |
the information system, upon detection of a potential integrity violation, provides the capability to audit the event; |
||
si-7(8)[3][b] |
the information system, upon detection of a potential integrity violation, initiates one or more of the following actions: |
|||
si-7(8)[3][b][1] |
generates an audit record; |
|||
si-7(8)[3][b][2] |
alerts current user; |
|||
si-7(8)[3][b][3] |
alerts organization-defined personnel or roles; and/or |
|||
si-7(8)[3][b][4] |
organization-defined other actions. |
|||
potential assessment methods and objects: Examine: [select from: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity scans; incident response records, list of security-relevant changes to the information system; automated tools supporting alerts and notifications if unauthorized security changes are detected; information system audit records; other relevant documents or records]. Interview: [select from: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer]. Test: [select from: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing the capability to audit potential integrity violations; automated mechanisms supporting and/or implementing alerts about potential integrity violations]. |