ISM-0284

History

Priority
should
Nov 2018
Removed
Removed due to duplication of intent of security control 0285.
2017
Agencies should:• verify the integrity of software using vendor supplied checksums when available• validate the software’s interaction with the operating system and network in a testenvironment prior to use on operational systems.
2015
Agencies should:• verify the integrity of software using vendor supplied checksums when available• validate the software’s interaction with the operating system and network in a testenvironment prior to use on operational systems.
2010
Agencies should:• obtain software from verifiable sources and verify its integrity using vendor supplied checksums• validate the software’s interaction with the operating systems and network in a test environment priorto use on operational systems.