STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SI-7 (8) — Software, Firmware, and Information Integrity

CCI-002724

Definition

Upon detection of a potential integrity violation, initiate one or more of the following actions: generate an audit record; alert the current user; alert organization-defined personnel or roles; and/or organization-defined other actions.

Parent Control

SI-7 (8)Software, Firmware, and Information IntegritySystem and Information Integrity

Linked STIG Checks (6)

V-235779CAT IIThe host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-235839CAT IIOnly trusted, signed images must be on Universal Control Plane (UCP) in Docker Enterprise.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-235846CAT IIOnly trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-235847CAT IIDocker Content Trust enforcement must be enabled in Universal Control Plane (UCP).Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-205598CAT IIThe Mainframe Product, upon detection of a potential integrity violation, must initiate one or more of the following actions: generate an audit record, alert the current user, alert personnel or roles as defined in the site security plan, and/or perform other actions as defined in the SSP.Mainframe Product Security Requirements GuideV-272882CAT IIMicrosoft Defender for Endpoint (MDE) must alert administrators on policy violations defined for endpoints.Microsoft Defender for Endpoint Security Technical Implementation Guide