SI-7 (6)
SI-7 (6): Cryptographic Protection
The information system implements cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.
Supplemental
Cryptographic mechanisms used for the protection of integrity include, for example, digital signatures and the computation and application of signed hashes using asymmetric cryptography, protecting the confidentiality of the key used to generate the hash, and using the public key to verify the hash information.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
Cross Domain (Access), Cross Domain (Multilevel), Cross Domain (Transfer), NC3, Privacy (High), Privacy (Low), Privacy (Mod), Privacy (PHI) |