1.7 KiB
implementation-status | control-origination | |||||
---|---|---|---|---|---|---|
|
|
cm-4.2 - [catalog] Verification of Controls
Control Statement
After system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.
Control guidance
Implementation in this context refers to installing changed code in the operational system that may have an impact on security or privacy controls.
Control assessment-objective
the impacted controls are implemented correctly with regard to meeting the security requirements for the system after system changes; the impacted controls are implemented correctly with regard to meeting the privacy requirements for the system after system changes; the impacted controls are operating as intended with regard to meeting the security requirements for the system after system changes; the impacted controls are operating as intended with regard to meeting the privacy requirements for the system after system changes; the impacted controls are producing the desired outcome with regard to meeting the security requirements for the system after system changes; the impacted controls are producing the desired outcome with regard to meeting the privacy requirements for the system after system changes.
What is the solution and how is it implemented?
Add control implementation description here for control cm-4.2