CM-3(5)
CM-3(5): Automated Security Response
Implement the following security responses automatically if baseline configurations are changed in an unauthorized manner: [security responses to be automatically implemented are defined;].
Supplemental
Automated security responses include halting selected system functions, halting system processing, and issuing alerts or notifications to organizational personnel when there is an unauthorized modification of a configuration item.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | high |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline |
| CSF Categories |
|---|
| None |