STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SI-7 (6)

System and Information IntegrityRev 5system

Software, Firmware, and Information Integrity

Control Statement

Implement cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.

Supplemental Guidance

Cryptographic mechanisms used to protect integrity include digital signatures and the computation and application of signed hashes using asymmetric cryptography, protecting the confidentiality of the key used to generate the hash, and using the public key to verify the hash information. Organizations that employ cryptographic mechanisms also consider cryptographic key management solutions.

Related Controls (2)

SC-12SC-13

CCI Identifiers (3)

CCI-002716Implement cryptographic mechanisms to detect unauthorized changes to software.CCI-002717Implement cryptographic mechanisms to detect unauthorized changes to firmware.CCI-002718Implement cryptographic mechanisms to detect unauthorized changes to information.

Linked STIG Checks (1)

Across 1 STIGs. Click to expand.