System & Information Integrity
System & Information Integrity is the defense and detection layer. Patch your systems, deploy endpoint protection, monitor for attacks, and detect unauthorized use.
The Three Themes
Section titled “The Three Themes”Patch and Protect (3.14.1–3.14.5) — Identify and fix vulnerabilities. Deploy malware protection on all systems. Keep definitions current. Run periodic and real-time scans.
Monitor (3.14.6) — Watch your systems and network traffic — inbound and outbound — for attack indicators.
Detect Misuse (3.14.7) — Define authorized use and detect when systems are used outside that scope.
All 7 Requirements
Section titled “All 7 Requirements”| Ref | Short Name | What It Covers |
|---|---|---|
| 3.14.1 | Patch Your Systems | Identify, report, and correct flaws on schedule |
| 3.14.2 | Deploy Anti-Malware | EDR/AV on every CUI system |
| 3.14.3 | Act on Advisories | Monitor and respond to security advisories |
| 3.14.4 | Keep Protection Current | Auto-update malware definitions and engines |
| 3.14.5 | Scan Regularly | Periodic full scans plus real-time scanning |
| 3.14.6 | Watch the Network | Monitor systems and traffic for attacks |
| 3.14.7 | Catch Unauthorized Use | Detect systems used outside authorized scope |