CCI-002716
      
        
        
      
      
        
  CCI-002716 Definition
      
      
        
        
      
    
  | Status | |
| Type | CheckType.technical | 
      
        
        
      
      
        
  Master Assessment Datasheet
      
      
        
        
      
    
  Implementation Guidance
Determine if: - cryptographic mechanisms are implemented to detect unauthorized changes to software. - cryptographic mechanisms are implemented to detect unauthorized changes to firmware. - cryptographic mechanisms are implemented to detect unauthorized changes to information.
Validation Procedures
Examine: [SELECT FROM: System and information integrity policy; system and information integrity procedures; procedures addressing software, firmware, and information integrity; system design documentation; system configuration settings and associated documentation; cryptographic mechanisms and associated documentation; records of detected unauthorized changes to software, firmware, and information; system audit records; system security plan; other relevant documents or records]. Interview: [SELECT FROM: Organizational personnel responsible for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer]. Test: [SELECT FROM: Software, firmware, and information integrity verification tools; cryptographic mechanisms implementing software, firmware, and information integrity].