CM-6(2)
      
        
        
      
      
        
  CM-6(2): Respond to Unauthorized Changes
      
      
        
        
      
    
  
    
      
  
    
    Take the following actions in response to unauthorized changes to [configuration settings requiring action upon an unauthorized change are defined;]: [actions to be taken upon an unauthorized change are defined;].
  
  
    
    
  Supplemental
Responses to unauthorized changes to configuration settings include alerting designated organizational personnel, restoring established configuration settings, or—in extreme cases—halting affected system processing.
| CIA Levels | |
|---|---|
| Confidentiality | unknown | 
| Integrity | high | 
| Availability | unknown | 
| Overlays | 
|---|
| DAF Baseline | 
| CSF Categories | 
|---|
| None |