CM-4(2)—Security Impact Analysis
PBMM (P3)
Secret (P3)
Operational
>Control Description
SECURITY IMPACT ANALYSIS | VERIFICATION OF SECURITY FUNCTIONS The organization, after the information system is changed, checks the security functions to verify that the functions are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security control requirements for the system.
>Supplemental Guidance
Implementation is this context refers to installing changed code in the operational information system. Related control: SA-11.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.