SI-14(1)—Refresh From Trusted Sources
>Control Description
Obtain software and data employed during system component and service refreshes from the following trusted sources: ⚙organization-defined trusted sources.
>Cross-Framework Mappings
>Supplemental Guidance
Trusted sources include software and data from write-once, read-only media or from selected offline secure storage facilities.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies and procedures govern refresh from trusted sources?
- •Who is responsible for monitoring system and information integrity?
- •How frequently are integrity monitoring processes reviewed and updated?
Technical Implementation:
- •What technical controls detect and respond to refresh from trusted sources issues?
- •How are integrity violations identified and reported?
- •What automated tools support system and information integrity monitoring?
Evidence & Documentation:
- •Can you provide recent integrity monitoring reports or alerts?
- •What logs demonstrate that SI-14(1) is actively implemented?
- •Where is evidence of integrity monitoring maintained and for how long?
Ask AI
Configure your API key to use AI features.