The organization inspects [organization-defined information systems, system components, or devices] [one or more of at random/at {{ insert: param, sa-18.2_prm_3 }}, upon {{ insert: param, sa-18.2_prm_4 }} ] to detect tampering.
Supplemental
This control enhancement addresses both physical and logical tampering and is typically applied to mobile devices, notebook computers, or other system components taken out of organization-controlled areas. Indications of need for inspection include, for example, when individuals return from travel to high-risk locations.