⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Barrier
Name
Type
Prevention
Mitigation
General
Category
Tags
(comma-separated)
Description
The system shall employ integrity verification mechanisms to detect unauthorized changes to software and information. Controls shall include secure boot, code signing, and file integrity monitoring.
Save changes
Cancel