The organization shall implement software, firmware, and information integrity checks to detect unauthorized changes to its critical system components during storage, transport, start-up and when determined necessary.
The organization shall implement automated tools where feasible to provide notification upon discovering discrepancies during integrity verification.
The organization shall implement automated tools where feasible to provide notification upon discovering discrepancies during integrity verification.
The organization shall implement automatic response capability with pre-defined security safeguards when integrity violations are discovered.
The organization shall implement automatic response capability with pre-defined security safeguards when integrity violations are discovered.