Defines the software, firmware, and information which will be subjected to integrity verification tools to detect unauthorized changes.
No STIG checks reference this CCI.