Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SI

SI-7Software, Firmware, and Information Integrity

Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: {{ insert: param, si-7_prm_1 }} ; and Take the following actions when unauthorized changes to the software, firmware, and information are detected: {{ insert: param, si-7_prm_2 }}.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (207)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-502Deserialization of Untrusted Data3,170Integrity verification of serialized information can detect tampering before deserialization occurs.
CWE-347Improper Verification of Cryptographic Signature789Integrity tools commonly rely on cryptographic signatures whose improper validation this weakness covers.
CWE-345Insufficient Verification of Data Authenticity654Mandates verification of data authenticity for software, firmware, and information.
CWE-494Download of Code Without Integrity Check243Explicitly detects code or firmware that was obtained or altered without an integrity check.
CWE-354Improper Validation of Integrity Check Value185Requires use of proper integrity verification tools, reducing the chance an incorrect check value is accepted.
CWE-506Embedded Malicious Code83Unauthorized insertion of malicious code into software or firmware is revealed by integrity monitoring.
CWE-353Missing Support for Integrity Check37Directly supplies the missing integrity verification mechanism the weakness describes.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-15556 KEV3.97.50.0609good
CVE-2026-3502 KEV3.77.80.0258good
CVE-2024-563362.09.80.0024good
CVE-2025-596952.09.80.0014good
CVE-2026-209972.09.80.0008good
CVE-2019-252682.09.80.0009good
CVE-2025-56513 UPD2.09.80.0053good
CVE-2026-275101.99.60.0014good
CVE-2025-275931.99.30.0019good
CVE-2025-593341.99.60.0017good
CVE-2026-330261.89.10.0002good
CVE-2026-403721.89.10.0003good
CVE-2025-05921.88.80.0010good
CVE-2026-259221.88.80.0001good
CVE-2025-587561.88.80.0138good
CVE-2025-574311.88.80.0014good
CVE-2025-120071.78.40.0001good
CVE-2026-4478 UPD1.68.10.0001good
CVE-2025-10581.68.10.0012good
CVE-2026-40070 UPD1.68.10.0001good
CVE-2026-318391.68.20.0002good
CVE-2026-206581.67.80.0002good
CVE-2026-14421.67.80.0001good
CVE-2026-323031.57.60.0002good
CVE-2024-523311.57.50.0008good

Other controls in family SI

SI-1 SI-10 SI-11 SI-12 SI-13 SI-14 SI-15 SI-16 SI-17 SI-18 SI-19 SI-2 SI-20 SI-21 SI-22 SI-23 SI-3 SI-4 SI-5 SI-6 SI-8 SI-9