STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SI-2

System and Information IntegrityRev 5organization

Flaw Remediation

Baselines:LowModerateHigh

Control Statement

a. Identify, report, and correct system flaws; b. Test software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation; c. Install security-relevant software and firmware updates within [Assignment: time period] of the release of the updates; and d. Incorporate flaw remediation into the organizational configuration management process.

Supplemental Guidance

The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security and privacy responsibilities. Organizations consider establishing a controlled patching environment for mission-critical systems. Security-relevant updates include patches, service packs, and malicious code signatures. Organizations also address flaws discovered during assessments, continuous monitoring, incident response activities, and system error handling. By incorporating flaw remediation into configuration management processes, required remediation actions can be tracked and verified. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of risk factors, including the security category of the system, the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw), the organizational risk tolerance, the mission supported by the system, or the threat environment. Some types of flaw remediation may require more testing than other types. Organizations determine the type of testing needed for the specific type of flaw remediation activity under consideration and the types of changes that are to be configuration-managed. Flaw remediation testing addresses both effectiveness of addressing security issues and for potential side effects on functionality, system and system component performance and operations. When implementing remediation activities, organizations consider the order and timing of updates to validate correct execution within the system environment, and to support system and component availability needs (i.e., implementing a staggered deployment strategy). In some situations, organizations may determine that the testing of software or firmware updates is not necessary or practical, such as when implementing simple malicious code signature updates. In testing decisions, organizations consider whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures. When implementing remediation activities, organizations consider the order and timing of updates to validate correct execution within the system environment, and to support system and component availability needs (i.e., implementing a staggered deployment strategy). Organizations verify that software and firmware updates come from authorized sources prior to downloading.

Related Controls (15)

CA-5CM-3CM-4CM-5CM-6CM-8MA-2RA-5SA-8SA-10SA-11SI-3SI-5SI-7SI-11

CCI Identifiers (12)

CCI-002602Test firmware updates related to flaw remediation for effectiveness before installation.CCI-002603Test firmware updates related to flaw remediation for potential side effects before installation.CCI-002604Defines the time period following the release of updates within which security-related software updates are to be installed.CCI-002605Install security-relevant software updates within an organization-defined time period of the release of the updates.CCI-002606Defines the time period following the release of updates within which security-related firmware updates are to be installed.CCI-002607Install security-relevant firmware updates within an organization-defined time period of the release of the updates.CCI-001226Report system flaws.CCI-001227Correct system flaws.CCI-001228

Linked STIG Checks (173)

Across 150 STIGs. Click to expand.

Test software updates related to flaw remediation for effectiveness before installation.
CCI-001229Test software updates related to flaw remediation for potential side effects before installation.
CCI-001230Incorporate flaw remediation into the organizational configuration management process.
CCI-001225Identify system flaws.