The information system performs an integrity check of [organization-defined software, firmware, and information] [one or more of at startup/at {{ insert: param, si-7.1_prm_3 }} / {{ insert: param, si-7.1_prm_4 }} ].
Supplemental
Security-relevant events include, for example, the identification of a new threat to which organizational information systems are susceptible, and the installation of new hardware, software, or firmware. Transitional states include, for example, system startup, restart, shutdown, and abort.