Description | The organization requires the developer of the information system, system component, or information system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies. |
---|---|
Assessment Procedure | SA-10(6).1 |
Organization Guidance | |
Auditor Guidance |
No STIG rules exist.