SI-10(5) INFORMATION INPUT VALIDATION | RESTRICT INPUTS TO TRUSTED SOURCES AND APPROVED FORMATS |
Scroll Prev Top Next More |
Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
si-10(5) |
information input validation | restrict inputs to trusted sources and approved formats |
||
|
assessment objective: Determine if the organization: |
||
si-10(5)[1] |
defines trusted sources to which the use of information inputs is to be restricted; |
||
si-10(5)[2] |
defines formats to which the use of information inputs is to be restricted; |
||
si-10(5)[3] |
restricts the use of information inputs to: |
||
si-10(5)[3][a] |
organization-defined trust sources; and/or |
||
si-10(5)[3][b] |
organization-defined formats. |
||
potential assessment methods and objects: Examine: [select from: System and information integrity policy; procedures addressing information input validation; information system design documentation; information system configuration settings and associated documentation; list of trusted sources for information inputs; list of acceptable formats for input restrictions; information system audit records; other relevant documents or records]. Interview: [select from: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer]. Test: [select from: Organizational processes for restricting information inputs; automated mechanisms supporting and/or implementing restriction of information inputs]. |