SI — System and Information Integrity
119 controls in the System and Information Integrity family
SI-1Policy And Procedures
LOW
MODERATE
HIGH
PRIVACY
SI-2Flaw Remediation
LOW
MODERATE
HIGH
SI-2(1)Central Management
SI-2(2)Automated Flaw Remediation Status
MODERATE
HIGH
SI-2(3)Time To Remediate Flaws And Benchmarks For Corrective Actions
SI-2(4)Automated Patch Management Tools
SI-2(5)Automatic Software And Firmware Updates
SI-2(6)Removal Of Previous Versions Of Software And Firmware
SI-2(7)Root Cause Analysis
SI-3Malicious Code Protection
LOW
MODERATE
HIGH
SI-3(1)Central Management
SI-3(2)Automatic Updates
SI-3(3)Non-Privileged Users
SI-3(4)Updates Only By Privileged Users
SI-3(5)Portable Storage Devices
SI-3(6)Testing And Verification
SI-3(7)Nonsignature-Based Detection
SI-3(8)Detect Unauthorized Commands
SI-3(9)Authenticate Remote Commands
SI-3(10)Malicious Code Analysis
SI-4System Monitoring
LOW
MODERATE
HIGH
SI-4(1)System-Wide Intrusion Detection System
SI-4(2)Automated Tools And Mechanisms For Real-Time Analysis
MODERATE
HIGH
SI-4(3)Automated Tool And Mechanism Integration
SI-4(4)Inbound And Outbound Communications Traffic
MODERATE
HIGH
SI-4(5)System-Generated Alerts
MODERATE
HIGH
SI-4(6)Restrict Non-Privileged Users
SI-4(7)Automated Response To Suspicious Events
SI-4(8)Protection Of Monitoring Information
SI-4(9)Testing Of Monitoring Tools And Mechanisms
SI-4(10)Visibility Of Encrypted Communications
HIGH
SI-4(11)Analyze Communications Traffic Anomalies
SI-4(12)Automated Organization-Generated Alerts
HIGH
SI-4(13)Analyze Traffic And Event Patterns
SI-4(14)Wireless Intrusion Detection
HIGH
SI-4(15)Wireless To Wireline Communications
SI-4(16)Correlate Monitoring Information
SI-4(17)Integrated Situational Awareness
SI-4(18)Analyze Traffic And Covert Exfiltration
SI-4(19)Risk For Individuals
SI-4(20)Privileged Users
HIGH
SI-4(21)Probationary Periods
SI-4(22)Unauthorized Network Services
HIGH
SI-4(23)Host-Based Devices
SI-4(24)Indicators Of Compromise
SI-4(25)Optimize Network Traffic Analysis
SI-5Security Alerts, Advisories, And Directives
LOW
MODERATE
HIGH
SI-5(1)Automated Alerts And Advisories
HIGH
SI-6Security And Privacy Function Verification
HIGH
SI-6(1)Notification Of Failed Security Tests
SI-6(2)Automation Support For Distributed Testing
SI-6(3)Report Verification Results
SI-7Software, Firmware, And Information Integrity
MODERATE
HIGH
SI-7(1)Integrity Checks
MODERATE
HIGH
SI-7(2)Automated Notifications Of Integrity Violations
HIGH
SI-7(3)Centrally Managed Integrity Tools
SI-7(4)Tamper-Evident Packaging
SI-7(5)Automated Response To Integrity Violations
HIGH
SI-7(6)Cryptographic Protection
SI-7(7)Integration Of Detection And Response
MODERATE
HIGH
SI-7(8)Auditing Capability For Significant Events
SI-7(9)Verify Boot Process
SI-7(10)Protection Of Boot Firmware
SI-7(11)Confined Environments With Limited Privileges
SI-7(12)Integrity Verification
SI-7(13)Code Execution In Protected Environments
SI-7(14)Binary Or Machine Executable Code
SI-7(15)Code Authentication
HIGH
SI-7(16)Time Limit On Process Execution Without Supervision
SI-7(17)Runtime Application Self-Protection
SI-8Spam Protection
MODERATE
HIGH
SI-8(1)Central Management
SI-8(2)Automatic Updates
MODERATE
HIGH
SI-8(3)Continuous Learning Capability
SI-9Information Input Restrictions
SI-10Information Input Validation
MODERATE
HIGH
SI-10(1)Manual Override Capability
SI-10(2)Review And Resolve Errors
SI-10(3)Predictable Behavior
SI-10(4)Timing Interactions
SI-10(5)Restrict Inputs To Trusted Sources And Approved Formats
SI-10(6)Injection Prevention
SI-11Error Handling
MODERATE
HIGH
SI-12Information Management And Retention
LOW
MODERATE
HIGH
PRIVACY
SI-12(1)Limit Personally Identifiable Information Elements
PRIVACY
SI-12(2)Minimize Personally Identifiable Information In Testing, Training, And Research
PRIVACY
SI-12(3)Information Disposal
PRIVACY
SI-13Predictable Failure Prevention
SI-13(1)Transferring Component Responsibilities
SI-13(2)Time Limit On Process Execution Without Supervision
SI-13(3)Manual Transfer Between Components
SI-13(4)Standby Component Installation And Notification
SI-13(5)Failover Capability
SI-14Non-Persistence
SI-14(1)Refresh From Trusted Sources
SI-14(2)Non-Persistent Information
SI-14(3)Non-Persistent Connectivity
SI-15Information Output Filtering
SI-16Memory Protection
MODERATE
HIGH
SI-17Fail-Safe Procedures
SI-18Personally Identifiable Information Quality Operations
PRIVACY
SI-18(1)Automation Support
SI-18(2)Data Tags
SI-18(3)Collection
SI-18(4)Individual Requests
PRIVACY
SI-18(5)Notice Of Correction Or Deletion
SI-19De-Identification
PRIVACY
SI-19(1)Collection
SI-19(2)Archiving
SI-19(3)Release
SI-19(4)Removal, Masking, Encryption, Hashing, Or Replacement Of Direct Identifiers
SI-19(5)Statistical Disclosure Control
SI-19(6)Differential Privacy
SI-19(7)Validated Algorithms And Software
SI-19(8)Motivated Intruder
SI-20Tainting
SI-21Information Refresh
SI-22Information Diversity
SI-23Information Fragmentation