3.14 — System & Information Integrity

System & Information Integrity (SI) Policy

Establishes requirements for identifying, reporting, and correcting system flaws, providing protection from malicious code, and monitoring system security alerts — covering 7 controls per NIST SP 800-171 Rev 2.

Family: 3.14 — SIControls: 7Owner: Kit E. Floyd, Jr.Last Review: April 3, 2026
SELF-ASSESSMENT

Control statuses below reflect an internal self-assessment prepared with AI assistance. Statuses marked "Implemented" may be organizational claims without verifiable evidence. See POA&M for known gaps.

Policy Statement

OCSI shall identify, report, and correct information and system flaws in a timely manner. The organization shall provide protection from malicious code at appropriate locations within organizational systems and monitor system security alerts and advisories.

Control Implementation
ControlRequirementImplementationStatus
3.14.1Identify, report, and correct information and information system flaws in a timely mannerPARTIAL. Flaw identification currently relies on manual review only. No automated vulnerability scanning. No external MSSP assessments conducted. Risk-based SLA defined (Critical: 24hr, High: 72hr, Medium: 30 days, Low: 90 days) but not tested. Remediation tracked via POA&M. Partial
3.14.2Provide protection from malicious code at appropriate locations within organizational systemsCSP prevents code injection by restricting script sources to 'self'. No user-supplied input rendered as HTML (all input sanitized). No eval(), innerHTML with unsanitized data, or dynamic script loading. Static HTML architecture minimizes injection vectors. Implemented
3.14.3Monitor system security alerts, advisories, and directives and take appropriate actions in responseNOT IMPLEMENTED. No external MSSP provides monitoring. No formal process for monitoring NIST NVD, CISA alerts, or GoDaddy advisories. No designated person or process for security alert triage. Not Implemented
3.14.4Update malicious code protection mechanisms when new releases are availablePARTIAL. CSP provides baseline protection. CDN dependencies are not reviewed on any schedule. No external MSSP recommends updates. Browser-based protections update automatically via browser vendors (not OCSI-controlled). Partial
3.14.5Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executedNOT IMPLEMENTED. No vulnerability scanning tools are in use. No external MSSP performs scans. Security headers are set but not verified on any recurring schedule. No SRI hashes on CDN resources. Deployment files are not scanned. Not Implemented
3.14.6Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacksPARTIAL. Audit logging captures authentication events and data modifications (client-side only). Failed login lockout exists. CSP violation reports configured. However: no SIEM, no server-side monitoring, no network traffic analysis, no real-time alerting. Partial
3.14.7Identify unauthorized use of organizational systemsPARTIAL. Audit log tracks access with timestamps. Failed login attempts logged. However: logs are client-side only (deletable by user), no weekly review occurs, no anomaly detection, and single shared account prevents identifying individual users. Partial
Threat Mitigation Summary
ThreatMitigationControl(s)
Cross-Site Scripting (XSS)CSP, input sanitization, no unsafe-inline scripts, X-XSS-Protection header3.14.2, 3.13.13
Code InjectionNo eval(), no dynamic script loading, CSP script-src 'self'3.14.2
ClickjackingX-Frame-Options DENY, CSP frame-ancestors 'none'3.13.1
MIME SniffingX-Content-Type-Options nosniff3.13.2
Credential TheftSHA-256 hashing, account lockout, session timeout3.5.10, 3.5.6
Data ExfiltrationCSP connect-src 'self', Referrer-Policy3.13.4, 3.13.6
Review Schedule: SI policy review schedule not yet established. Audit log reviews not occurring on any schedule. No vulnerability scanning in place. External MSSP not yet engaged.