Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SI

SI-7Software, Firmware, and Information Integrity

Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: {{ insert: param, si-7_prm_1 }} ; and Take the following actions when unauthorized changes to the software, firmware, and information are detected: {{ insert: param, si-7_prm_2 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (207)

Weaknesses this control addresses (7)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-502Deserialization of Untrusted Data3,125Integrity verification of serialized information can detect tampering before deserialization occurs.
CWE-347Improper Verification of Cryptographic Signature778Integrity tools commonly rely on cryptographic signatures whose improper validation this weakness covers.
CWE-345Insufficient Verification of Data Authenticity643Mandates verification of data authenticity for software, firmware, and information.
CWE-494Download of Code Without Integrity Check242Explicitly detects code or firmware that was obtained or altered without an integrity check.
CWE-354Improper Validation of Integrity Check Value184Requires use of proper integrity verification tools, reducing the chance an incorrect check value is accepted.
CWE-506Embedded Malicious Code80Unauthorized insertion of malicious code into software or firmware is revealed by integrity monitoring.
CWE-353Missing Support for Integrity Check37Directly supplies the missing integrity verification mechanism the weakness describes.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-15556 KEV3.97.50.0609good
CVE-2026-3502 KEV3.77.80.0275good
CVE-2024-563362.09.80.0031good
CVE-2025-596952.09.80.0013good
CVE-2026-209972.09.80.0012good
CVE-2019-252682.09.80.0007good
CVE-2025-565132.09.80.0053good
CVE-2026-275101.99.60.0014good
CVE-2025-275931.99.30.0019good
CVE-2025-593341.99.60.0017good
CVE-2025-587561.98.80.0166good
CVE-2026-330261.89.10.0001good
CVE-2026-403721.89.10.0002good
CVE-2025-05921.88.80.0010good
CVE-2026-259221.88.80.0001good
CVE-2025-574311.88.80.0014good
CVE-2025-120071.78.40.0001good
CVE-2026-44781.68.10.0001good
CVE-2025-10581.68.10.0012good
CVE-2026-400701.68.10.0001good
CVE-2026-318391.68.20.0002good
CVE-2026-206581.67.80.0002good
CVE-2026-323031.57.60.0002good
CVE-2024-523311.57.50.0008good
CVE-2026-323171.57.60.0001good

Other controls in family SI

SI-1 SI-10 SI-11 SI-12 SI-13 SI-14 SI-15 SI-16 SI-17 SI-18 SI-19 SI-2 SI-20 SI-21 SI-22 SI-23 SI-3 SI-4 SI-5 SI-6 SI-8 SI-9