END-06
Endpoint File Integrity Monitoring (FIM)
Description
Mechanisms exist to utilize File Integrity Monitor (FIM), or similar technologies, to detect and report on unauthorized changes to selected files and configuration settings.
Control Question
Does the organization utilize File Integrity Monitor (FIM), or similar technologies, to detect and report on unauthorized changes to selected files and configuration settings?
Control Metadata
Domain:
Endpoint Security
Validation Cadence:
Annual
Evidence Request List:
E-AST-27
