The organization shall implement hardware integrity checks to detect unauthorized tampering to its critical system's hardware.
The organization shall incorporate the detection of unauthorized tampering to its critical system's hardware into the organization incident response capability.