Employ integrity verification tools to detect unauthorized changes to organization-defined software, firmware, and information.
No STIG checks reference this CCI.