NIST Special Publication 800-53 (Rev. 4)

Security and Privacy Controls for Federal Information Systems and Organizations

SI-6 SECURITY FUNCTION VERIFICATION

Family:
System and Information Integrity
Class:
Priority:
P1 - Implement P1 security controls first.
Baseline Allocation:
Low Moderate High
SI-6

Control Description

The information system:

a. Verifies the correct operation of [Assignment: organization-defined security functions];

b. Performs this verification [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]];

c. Notifies [Assignment: organization-defined personnel or roles] of failed security verification tests; and

d. [Selection (one or more): shuts the information system down; restarts the information system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.

Supplemental Guidance

Transitional states for information systems include, for example, system startup, restart, shutdown, and abort. Notifications provided by information systems include, for example, electronic alerts to system administrators, messages to local computer consoles, and/or hardware indications such as lights.

Related to: CA-7CM-6

Control Enhancements

SI-6 (1) SECURITY FUNCTION VERIFICATION | NOTIFICATION OF FAILED SECURITY TESTS
[Withdrawn: Incorporated into SI-6].
SI-6 (2) SECURITY FUNCTION VERIFICATION | AUTOMATION SUPPORT FOR DISTRIBUTED TESTING
The information system implements automated mechanisms to support the management of distributed security testing.
Supplemental Guidance: Related to: SI-2
SI-6 (3) SECURITY FUNCTION VERIFICATION | REPORT VERIFICATION RESULTS
The organization reports the results of security function verification to [Assignment: organization-defined personnel or roles].
Supplemental Guidance: Organizational personnel with potential interest in security function verification results include, for example, senior information security officers, information system security managers, and information systems security officers.
Related to: SA-12SI-4SI-5

References

None.