STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← RA-5 (7) — Automated Detection and Notification of Unauthorized Components

CCI-001069

Definition

The organization employs automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization-defined frequency.

Parent Control

RA-5 (7)Automated Detection and Notification of Unauthorized ComponentsRisk Assessment

Linked STIG Checks (1)

V-11945CAT IIA file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide