Navigate
SI-7
      
        
        
      
      
        
  SI-7: Software, Firmware, and Information Integrity
      
      
        
        
      
    
  - a: Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [one of ] ; and
- b: Take the following actions when unauthorized changes to the software, firmware, and information are detected: [one of ].
Supplemental
Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems (with key internal components, such as kernels or drivers), middleware, and applications. Firmware interfaces include Unified Extensible Firmware Interface (UEFI) and Basic Input/Output System (BIOS). Information includes personally identifiable information and metadata that contains security and privacy attributes associated with information. Integrity-checking mechanisms—including parity checks, cyclical redundancy checks, cryptographic hashes, and associated tools—can automatically monitor the integrity of systems and hosted applications.
| CIA Levels | |
|---|---|
| Confidentiality | unknown | 
| Integrity | moderate | 
| Availability | unknown | 
| Overlays | 
|---|
| DAF Baseline, Int-A, Int-B, Int-C, Privacy (high), Privacy (moderate) | 
| CSF Categories | 
|---|
| PR.DS-6 | 
      
        
        
      
      
        
  Related Controls
      
      
        
        
      
    
  
    
  The controls below (if any) were marked by NIST as being related to SI-7.
  
  
  
    
      
        
        
      
      
        
  Enhancements
      
      
        
        
      
    
  
    
  The controls below (if any) add on to the requirements of SI-7.
  
  
  
    
      
        
        
      
      
        
  Related CCIs
      
      
        
        
      
    
  
    
  The CCIs below are tied to SI-7.