SI-7(2) - Software, Firmware, and Information Integrity | Automated Notifications of Integrity Violations

Employ automated tools that provide notification to [Assignment: organization-defined personnel or roles] upon discovering discrepancies during integrity verification.


ID: SI-7(2)
Enhancement of : SI-7

Space Segment Guidance

Integrate continuous code-use monitoring into the command and data handling task. The monitor records a running hash of executable pages and critical configuration registers, writes deltas to a circular log, and streams alerts when contact is available. Sampling every few minutes balances processor load against the need to catch a fault injection quickly. Coupling the sampler with the existing watchdog timer minimizes new lines of code and power draw while extending visibility into attacks that activate long after boot.