The organization shall implement software, firmware, and information integrity checks to detect unauthorized changes to its critical system components during storage, transport, start-up and when determined necessary.
The organization shall implement automated tools where feasible to provide notification upon discovering discrepancies during integrity verification.
The organization shall implement automatic response capability with pre-defined security safeguards when integrity violations are discovered.