Under active development Content is continuously updated and improved

CM-4(2)Security Impact Analysis

PBMM (P3)
Secret (P3)
Operational

>Control Description

SECURITY IMPACT ANALYSIS | VERIFICATION OF SECURITY FUNCTIONS The organization, after the information system is changed, checks the security functions to verify that the functions are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security control requirements for the system.

>Supplemental Guidance

Implementation is this context refers to installing changed code in the operational information system. Related control: SA-11.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.

Ask AI

Configure your API key to use AI features.