CM-6(2)
CM-6(2): Respond to Unauthorized Changes
The organization employs [one of ] to respond to unauthorized changes to [one of ].
Supplemental
Responses to unauthorized changes to configuration settings can include, for example, alerting designated organizational personnel, restoring established configuration settings, or in extreme cases, halting affected information system processing.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |