CM-6(2)
CM-6(2): Respond to Unauthorized Changes
The organization employs [organization-defined security safeguards] to respond to unauthorized changes to [organization-defined configuration settings].
Supplemental
Responses to unauthorized changes to configuration settings can include, for example, alerting designated organizational personnel, restoring established configuration settings, or in extreme cases, halting affected information system processing.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |