CM-4 (2)
CM-4 (2): Verification Of Security Functions
The organization, after the information system is changed, checks the security functions to verify that the functions are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security requirements for the system.
Supplemental
Implementation is this context refers to installing changed code in the operational information system.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
Cross Domain (Access), Cross Domain (Multilevel), Cross Domain (Transfer), NC3, Privacy (High), Privacy (Mod), Privacy (PHI) |