System and Information Integrity
NIST SP 800-53 Rev 5 System and Information Integrity controls.
Policy and Procedures
Develop, document, and disseminate to [parameter]:
Flaw Remediation
Identify, report, and correct system flaws;
Malicious Code Protection
Implement [parameter] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code;
System Monitoring
Monitor the system to detect:
Security Alerts, Advisories, and Directives
Receive system security alerts, advisories, and directives from [parameter] on an ongoing basis;
Security and Privacy Function Verification
Verify the correct operation of [parameter];
Software, Firmware, and Information Integrity
Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [parameter] ; and
Spam Protection
Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and
Information Input Restrictions
Information Input Restrictions
Information Input Validation
Check the validity of the following information inputs: [parameter].
Error Handling
Generate error messages that provide information necessary for corrective actions without revealing information that could be exploited; and
Information Management and Retention
Manage and retain information within the system and information output from the system in accordance with applicable laws, executive orders, directives, regulations, policies, standards, guidelines and operational requirements.
Predictable Failure Prevention
Determine mean time to failure (MTTF) for the following system components in specific environments of operation: [parameter] ; and
Non-persistence
Implement non-persistent [parameter] that are initiated in a known state and terminated [parameter].
Information Output Filtering
Validate information output from the following software programs and/or applications to ensure that the information is consistent with the expected content: [parameter].
Memory Protection
Implement the following controls to protect the system memory from unauthorized code execution: [parameter].
Fail-safe Procedures
Implement the indicated fail-safe procedures when the indicated failures occur: [parameter].
Personally Identifiable Information Quality Operations
Check the accuracy, relevance, timeliness, and completeness of personally identifiable information across the information life cycle [parameter] ; and
De-identification
Remove the following elements of personally identifiable information from datasets: [parameter] ; and
Tainting
Embed data or capabilities in the following systems or system components to determine if organizational data has been exfiltrated or improperly removed from the organization: [parameter].
Information Refresh
Refresh [parameter] at [parameter] or generate the information on demand and delete the information when no longer needed.
Information Diversity
Identify the following alternative sources of information for [parameter]: [parameter] ; and
Information Fragmentation
Based on [parameter]: