SI-7 - Software, Firmware, and Information Integrity

a. Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [Assignment: organization-defined software, firmware, and information]; and b. Take the following actions when unauthorized changes to the software, firmware, and information are detected: [Assignment: organization-defined actions].


ID: SI-7

Space Segment Guidance

Integrity protections for software, firmware, and information typically hinge on signed images, checksums, and on-boot verification. Consider measuring critical configuration tables, logging image/bitstream IDs, and reporting verification outcomes (including reject reasons) in telemetry. Align staging/verification/activation with pass schedules using hold/commit points and resumable uploads, and ensure measurements persist across resets/SEUs so operators can reconcile state within a single contact.