CM-6(2)
CM-6(2): Respond to Unauthorized Changes
Take the following actions in response to unauthorized changes to [configuration settings requiring action upon an unauthorized change are defined;]: [actions to be taken upon an unauthorized change are defined;].
Supplemental
Responses to unauthorized changes to configuration settings include alerting designated organizational personnel, restoring established configuration settings, or—in extreme cases—halting affected system processing.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | high |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline |
| CSF Categories |
|---|
| None |