ARTIFACTS

SI: SYSTEM & INFORMATION INTEGRITY

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for System & Information Security (SI); and documents that are widely used in the assessment of controls and control enhancements in the System & Information Security (SI) family. Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR SYSTEM AND INFORMATION INTEGRITY (SI)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
System & Information Integrity policy
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
ACCESS CONTROL POLICY & PROCEDURES (AC)
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of System & Information Security (SI) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
Access control POLICY & PROCEDURES SI-4 (3)
SI-10
SI-10 (1)
SI-10 (2)
Media protection POLICY & PROCEDURES SI-12
Procedures addressing configuration management SI-2
Procedures addressing flaw remediation SI-2
SI-2 (1)
SI-2 (2)
SI-2 (3)
SI-2 (5)
SI-2 (6)
SI-3 (10)
Procedures addressing incident response SI-3 (10)
SI-7 (7)
Procedures addressing information input validation SI-10
SI-10 (1)
SI-10 (2)
SI-10 (3)
SI-10 (4)
SI-10 (5)
Procedures addressing information output filtering SI-15
Procedures addressing information system error handling SI-11
Procedures addressing information system monitoring SI-4 (19)
SI-4 (21)
SI-4 (24)
Procedures addressing information system monitoring tools and techniques SI-4
SI-4 (1)
SI-4 (2)
SI-4 (3)
SI-4 (4)
SI-4 (5)
SI-4 (7)
SI-4 (10)
SI-4 (11)
SI-4 (12)
SI-4 (13)
SI-4 (14)
SI-4 (15)
SI-4 (16)
SI-4 (17)
SI-4 (18)
SI-4 (20)
SI-4 (22)
SI-4 (23)
Procedures addressing information system output handling and retention SI-12
Procedures addressing malicious code protection SI-3
SI-3 (1)
SI-3 (2)
SI-3 (4)
SI-3 (6)
SI-3 (7)
SI-3 (8)
SI-3 (9)
SI-3 (10)
Procedures addressing memory protection for the information system SI-16
SI-17
Procedures addressing non-persistence for information system components SI-14
SI-14 (1)
Procedures addressing predictable failure prevention SI-13
SI-13 (1)
SI-13 (3)
SI-13 (4)
SI-13 (5)
Procedures addressing security alerts, advisories, and directives SI-5
SI-5 (1)
Procedures addressing security function verification SI-6
SI-6 (2)
SI-6 (3)
Procedures addressing software and information integrity SI-7 (16)
Procedures addressing software, firmware, and information integrity SI-7
SI-7 (1)
SI-7 (2)
SI-7 (3)
SI-7 (5)
SI-7 (6)
SI-7 (7)
SI-7 (8)
SI-7 (9)
SI-7 (10)
SI-7 (11)
SI-7 (12)
SI-7 (13)
SI-7 (14)
SI-7 (15)
Procedures addressing spam protection SI-8
SI-8 (1)
SI-8 (2)
SI-8 (3)
Procedures addressing testing of information system monitoring tools and techniques SI-4 (9)
System and information integrity POLICY & PROCEDURES SI-1

Evidence, Records & Artifacts

Here you'll find a catalog of System & Information Security (SI) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Alerts/notifications generated based on compromise indicators SI-4 (5)
Alerts/notifications generated based on detected suspicious events SI-4 (7)
Alerts/notifications of failed security verification tests SI-6
Alerts/notifications provided to security personnel SI-4 (12)
Alerts/notifications provided upon discovering discrepancies during integrity verifications SI-7 (2)
Approval records for execution of binary and machine-executable code SI-7 (13)
SI-7 (14)
Automated mechanisms supporting centralized management of flaw remediation SI-2 (1)
Automated mechanisms supporting centralized management of flaw remediation SI-2 (2)
Automated mechanisms supporting centralized management of malicious code protection mechanisms SI-3 (1)
SI-3 (2)
Automated mechanisms supporting flaw remediation SI-2 (6)
Automated mechanisms supporting flaw remediation and automatic software/firmware updates SI-2 (5)
Automated mechanisms supporting the distribution of security alert and advisory information SI-5 (1)
Automated tools supporting alerts and notifications for integrity discrepancies SI-7 (2)
Automated tools supporting alerts and notifications if unauthorized security changes are detected SI-7 (8)
Configuration management POLICY & PROCEDURES SI-3
SI-8
Continuous monitoring strategy SI-4
Cryptographic mechanisms and associated documentation SI-7 (6)
SI-7 (15)
Documentation describing failover capability provided for the information system SI-13 (5)
Documentation for automated tools and applications to verify validity of information SI-10
Documentation providing evidence of testing intrusion-monitoring tools SI-4 (9)
Documentation providing structure/content of error messages SI-11
Documented authorization/approval of network services SI-4 (22)
Event correlation logs or records SI-4 (16)
Event correlation logs or records resulting from physical, cyber, and supply chain activities SI-4 (17)
Facility diagram/layout SI-4
Federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention SI-12
Host-based monitoring mechanisms SI-4 (23)
Incident response records SI-7 (7)
SI-7 (8)
Information audit records SI-7 (5)
SI-7 (7)
Information input validation error logs or records SI-10 (2)
Information retention records, SI-12
Information system monitoring logs or records SI-4 (11)
SI-4 (12)
SI-4 (18)
SI-4 (20)
SI-4 (21)
SI-4 (22)
SI-4 (23)
SI-4 (24)
Information system monitoring tools and techniques documentation SI-4
SI-4 (1)
SI-4 (2)
SI-4 (3)
SI-4 (4)
SI-4 (5)
SI-4 (7)
SI-4 (10)
SI-4 (11)
SI-4 (12)
SI-4 (13)
SI-4 (14)
SI-4 (15)
SI-4 (16)
SI-4 (17)
SI-4 (18)
SI-4 (20)
SI-4 (21)
SI-4 (22)
SI-4 (23)
SI-4 (24)
Information system protocols SI-4 (4)
SI-4 (10)
SI-4 (14)
Information system protocols documentation SI-4 (13)
SI-4 (15)
Installation/change control records for security-relevant software and firmware updates SI-2
Integrity verification records SI-7 (12)
Integrity verification tools and associated documentation SI-7
SI-7 (1)
SI-7 (2)
SI-7 (3)
SI-7 (5)
SI-7 (8)
SI-7 (9)
SI-7 (10)
Locations within information system where monitoring devices are deployed SI-4
Malicious code protection mechanisms SI-3
SI-3 (4)
SI-3 (7)
SI-3 (8)
SI-3 (9)
Malicious code protection mechanisms, tools, and techniques SI-3 (10)
Network diagram SI-4 (11)
Network diagram SI-4 (18)
Notifications or alerts of unauthorized network services SI-4 (22)
Record of actions initiated by malicious code protection mechanisms in response to malicious code detection SI-3
Records generated/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes SI-7
Records of actions taken to terminate suspicious events SI-4 (7)
Records of detected unauthorized changes to software, firmware, and information SI-7 (6)
Records of flaw remediation events resulting from malicious code analyses SI-3 (10)
Records of integrity checks and responses to integrity violations SI-7 (5)
Records of integrity scans SI-7
SI-7 (1)
SI-7 (2)
SI-7 (3)
SI-7 (5)
SI-7 (8)
SI-7 (9)
SI-7 (10)
Records of integrity verification scans SI-7 (9)
SI-7 (10)
Records of malicious code protection updates SI-3
SI-3 (4)
SI-3 (7)
Records of recent security-relevant software and firmware updates automatically installed to information system components SI-2 (5)
Records of security alerts and advisories SI-5
SI-5 (1)
Records of security function verification results SI-6 (3)
Records of software and firmware component removals after updated versions are installed SI-2 (6)
Records of spam protection updates SI-8
SI-8 (2)
Records providing evidence of test cases executed on malicious code protection mechanisms SI-3 (6)
Records providing time stamps of flaw identification and subsequent flaw remediation activities SI-2 (3)
Results from malicious code analyses SI-3 (10)
Review records of information input validation errors and resulting resolutions SI-10 (2)
Scan results from malicious code protection mechanisms SI-3
Separation of duties POLICY & PROCEDURES SI-10
SI-10 (1)
SI-10 (2)
Spam protection mechanisms SI-8
SI-8 (1)
SI-8 (2)
SI-8 (3)
Test cases SI-3 (6)
Test results from the installation of software and firmware updates to correct information system flaws SI-2
Warning messages sent upon detection of unauthorized operating system command execution SI-3 (8)
SI-3 (9)

System & Information Security (SI) Related Lists

These are the ASystem & Information Security (SI) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
List of acceptable formats for input restrictions SI-10 (5)
List of acceptable thresholds for false positives and false negatives SI-4 (13)
List of actions to be taken once information system component failure is detected SI-13 (4)
List of benchmarks for taking corrective action on flaws identified SI-2 (3)
List of flaws and vulnerabilities potentially affecting the information system SI-2
List of inappropriate or unusual activities (with security implications) that trigger alerts SI-4 (12)
List of individuals who have been identified as posing an increased level of risk SI-4 (19)
List of information inputs requiring validity checks SI-10
List of information system components requiring host-based monitoring SI-4 (23)
List of MTTF substitution criteria SI-13
List of privileged users SI-4 (20)
List of profiles representing common traffic patterns and/or events SI-4 (13)
List of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws) SI-2
List of security safeguards protecting information system memory from unauthorized code execution SI-16
SI-17
List of security-relevant changes to the information system
List of system transition states requiring security functionality verification SI-6
List of trusted sources for information inputs SI-10 (5)
Go to The List of Lists