CM-4(2)
CM-4(2): Verification of Controls
After system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.
Supplemental
Implementation in this context refers to installing changed code in the operational system that may have an impact on security or privacy controls.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | moderate |
| Availability | unknown |
| Overlays |
|---|
| CMMC, DAF Baseline, Int-A, Int-B, Int-C, Privacy (high), Privacy (moderate) |
| CSF Categories |
|---|
| None |