The organization shall implement hardware integrity checks to detect unauthorized tampering to its critical
system's hardware.
Guidance
State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks,
cryptographic hashes) and associated tools can automatically monitor the integrity of information
systems and hosted applications.
The organization shall incorporate the detection of unauthorized tampering to its critical
system's hardware into the organization incident response capability.