History
- Priority
- should
- Nov 2018
- Removed
- Removed due to duplication of intent of security control 0285.
- 2017
- Agencies should:• verify the integrity of software using vendor supplied checksums when available• validate the software’s interaction with the operating system and network in a testenvironment prior to use on operational systems.
- 2015
- Agencies should:• verify the integrity of software using vendor supplied checksums when available• validate the software’s interaction with the operating system and network in a testenvironment prior to use on operational systems.
- 2010
- Agencies should:• obtain software from verifiable sources and verify its integrity using vendor supplied checksums• validate the software’s interaction with the operating systems and network in a test environment priorto use on operational systems.