Verify the correct operation of security functions; privacy functions; one or more: ...; upon command by user with appropriate privilege; ...; system transitional states; frequency; personnel or roles; one or more: shut the system down; restart the system; ...; alternative action(s); Perform the verification of the functions specified in SI-6a one or more: ...; upon command by user with appropriate privilege; ...; Alert personnel or roles to failed security and privacy verification tests; and one or more: shut the system down; restart the system; ... when anomalies are discovered.
Transitional states for systems include system startup, restart, shutdown, and abort. System notifications include hardware indicator lights, electronic alerts to system administrators, and messages to local computer consoles. In contrast to security function verification, privacy function verification ensures that privacy functions operate as expected and are approved by the senior agency official for privacy or that privacy attributes are applied or used as expected.
security functions are verified to be operating correctly; privacy functions are verified to be operating correctly; security functions are verified one or more: ...; upon command by user with appropriate privilege; ...; privacy functions are verified one or more: ...; upon command by user with appropriate privilege; ...; personnel or roles is/are alerted to failed security verification tests; personnel or roles is/are alerted to failed privacy verification tests; one or more: shut the system down; restart the system; ... is/are initiated when anomalies are discovered.
No cross-framework mappings available