myctrl.tools
Compare

SI-14(1)Refresh From Trusted Sources

>Control Description

Obtain software and data employed during system component and service refreshes from the following trusted sources: organization-defined trusted sources.

>Cross-Framework Mappings

>Supplemental Guidance

Trusted sources include software and data from write-once, read-only media or from selected offline secure storage facilities.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What policies and procedures govern refresh from trusted sources?
  • Who is responsible for monitoring system and information integrity?
  • How frequently are integrity monitoring processes reviewed and updated?

Technical Implementation:

  • What technical controls detect and respond to refresh from trusted sources issues?
  • How are integrity violations identified and reported?
  • What automated tools support system and information integrity monitoring?

Evidence & Documentation:

  • Can you provide recent integrity monitoring reports or alerts?
  • What logs demonstrate that SI-14(1) is actively implemented?
  • Where is evidence of integrity monitoring maintained and for how long?

Ask AI

Configure your API key to use AI features.