STIGhub
STIGs
RMF Controls
Compare
← All Controls
SI-6
System and Information Integrity
Rev 3
Security and Privacy Function Verification
CCI Identifiers (23)
CCI-001291
The information system verifies the correct operation of security functions in accordance with organization-defined conditions and in accordance with organization-defined frequency (if periodic verification).
CCI-001292
The organization defines the appropriate conditions, including the system transitional states if applicable, for verifying the correct operation of security functions.
CCI-001293
The organization defines the information system responses and alternative action(s) to anomalies discovered during security function verification.
CCI-001294
Alert organization-defined personnel or roles of failed security verification tests.
CCI-001674
The information system responds to security function anomalies in accordance with organization-defined responses and alternative action(s).
CCI-001676
The organization defines, for periodic security function verification, the frequency of the verifications.
CCI-002695
Defines the security functions that require verification of correct operation.
CCI-002696
Verify correct operation of organization-defined security functions.
CCI-002697
Defines the frequency at which it will verify correct operation of organization-defined security functions.
CCI-002698
Defines the system transitional states when the system will verify correct operation of organization-defined security functions.
CCI-002699
Perform verification of the correct operation of organization-defined security functions: when the system is in an organization-defined transitional state; upon command by a user with appropriate privileges; and/or on an organization-defined frequency.
CCI-002700
Defines the personnel or roles to be notified when security verification tests fail.
CCI-002701
Defines alternative action(s) to be taken when anomalies in the operation of organization-defined security functions are discovered.
CCI-002702
Shut the system down, restart the system, and/or initiate organization-defined alternative action(s) when anomalies in the operation of the organization-defined security functions are discovered.
CCI-004984
Defines the privacy functions that require verification of correct operation.
CCI-004985
Verify correct operation of organization-defined privacy functions.
CCI-004986
Defines the frequency at which it will verify correct operation of organization-defined privacy functions.
CCI-004987
Defines the system transitional states when the system will verify correct operation of organization-defined privacy functions.
CCI-004988
Perform verification of the correct operation of organization-defined privacy functions: when the system is in an organization-defined transitional state; upon command by a user with appropriate privileges; and/or on an organization-defined frequency.
CCI-004989
Alert organization-defined personnel or roles of failed privacy verification tests.
CCI-004990
Defines the personnel or roles to be notified when privacy verification tests fail.
CCI-004991
Defines alternative action(s) to be taken when anomalies in the operation of organization-defined privacy functions are discovered.
CCI-004992
Shut the system down, restart the system, and/or initiate organization-defined alternative action(s) when anomalies in the operation of the organization-defined privacy functions are discovered.
Linked STIG Checks (158)
Across 67 STIGs. Click to expand.
▶
Amazon Linux 2023 Security Technical Implementation Guide
4 checks
▶
Anduril NixOS Security Technical Implementation Guide
1 check
▶
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
1 check
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
1 check
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
1 check
▶
Application Programming Interface (API) Security Requirements Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
3 checks
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
3 checks
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
2 checks
▶
BIND 9.x Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
3 checks
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
3 checks
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
4 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
4 checks
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
3 checks
▶
Container Platform Security Requirements Guide
3 checks
▶
Domain Name System (DNS) Security Requirements Guide
6 checks
▶
General Purpose Operating System Security Requirements Guide
3 checks
▶
IBM Aspera Platform 4.2 Security Technical Implementation Guide
1 check
▶
IBM MaaS360 with Watson v10.x MDM Security Technical Implementation Guide
1 check
▶
IBM z/OS ACF2 Security Technical Implementation Guide
1 check
▶
IBM z/OS RACF Security Technical Implementation Guide
1 check
▶
IBM z/OS TSS Security Technical Implementation Guide
1 check
▶
Infoblox 7.x DNS Security Technical Implementation Guide
1 check
▶
Infoblox 8.x DNS Security Technical Implementation Guide
2 checks
▶
Ivanti EPMM Server Security Technical Implementation Guide
1 check
▶
Ivanti MobileIron Core MDM Server Security Technical Implementation Guide
1 check
▶
Mainframe Product Security Requirements Guide
4 checks
▶
Microsoft Intune MDM Service Desktop & Mobile Security Technical Implementation Guide
1 check
▶
Microsoft Intune MDM Service Desktop & Mobile Security Technical Implementation Guide
1 check
▶
Microsoft Windows 2012 Server Domain Name System Security Technical Implementation Guide
2 checks
▶
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
4 checks
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
2 checks
▶
MobileIron Core v10.x MDM Security Technical Implementation Guide
1 check
▶
Nutanix Acropolis GPOS Security Technical Implementation Guide
2 checks
▶
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
1 check
▶
Oracle Linux 7 Security Technical Implementation Guide
4 checks
▶
Oracle Linux 8 Security Technical Implementation Guide
3 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
4 checks
▶
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide
3 checks
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
15 checks
▶
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
3 checks
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
4 checks
▶
Red Hat OpenShift Container Platform 4.12 Security Technical Implementation Guide
2 checks
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
3 checks
▶
Riverbed NetIM OS Security Technical Implementation Guide
4 checks
▶
Samsung SDS EMM Security Technical Implementation Guide
1 check
▶
SDN Controller Security Requirements Guide
1 check
▶
SLES 12 Security Technical Implementation Guide
1 check
▶
Solaris 11 SPARC Security Technical Implementation Guide
2 checks
▶
Solaris 11 X86 Security Technical Implementation Guide
2 checks
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
3 checks
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
3 checks
▶
Tanium 7.x Operating System on TanOS Security Technical Implementation Guide
1 check
▶
Trend Micro Deep Security 9.x Security Technical Implementation Guide
2 checks
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
2 checks
▶
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
3 checks
▶
Unified Endpoint Management Server Security Requirements Guide
4 checks
▶
Virtual Machine Manager Security Requirements Guide
3 checks
▶
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
1 check
▶
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
1 check
▶
VMware Workspace ONE UEM Security Technical Implementation Guide
1 check