STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SI-7

System and Information IntegrityRev 5organization

Software, Firmware, and Information Integrity

Baselines:ModerateHigh

Control Statement

a. Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [Assignment: organization-defined software, firmware, and information] ; and b. Take the following actions when unauthorized changes to the software, firmware, and information are detected: [Assignment: organization-defined actions].

Supplemental Guidance

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems (with key internal components, such as kernels or drivers), middleware, and applications. Firmware interfaces include Unified Extensible Firmware Interface (UEFI) and Basic Input/Output System (BIOS). Information includes personally identifiable information and metadata that contains security and privacy attributes associated with information. Integrity-checking mechanisms—including parity checks, cyclical redundancy checks, cryptographic hashes, and associated tools—can automatically monitor the integrity of systems and hosted applications.

Related Controls (23)

AC-4CM-3CM-7CM-8MA-3MA-4RA-5SA-8SA-9SA-10SC-8SC-12SC-13SC-28SC-37SI-3SR-3SR-4SR-5SR-6SR-9

CCI Identifiers (5)

CCI-002703Defines the software, firmware, and information which will be subjected to integrity verification tools to detect unauthorized changes.CCI-002704Employ integrity verification tools to detect unauthorized changes to organization-defined software, firmware, and information.CCI-001297The information system detects unauthorized changes to software and information.CCI-004996Take organization-defined actions when unauthorized changes to the software, firmware, and information are detected.CCI-004997Defines the actions to be taken when unauthorized changes to the software, firmware, and information are detected.

Linked STIG Checks (4)

Across 2 STIGs. Click to expand.

SR-10
SR-11