Software, Firmware, and Information Integrity | Integration of Detection and Response
To meet the Software, Firmware, and Information Integrity | Integration of Detection and Response requirement, you must detect unauthorized changes to your established configuration settings and route those detections into incident response as actionable events. That means defining “unauthorized change,” implementing monitoring to find it, and wiring alerts, triage, escalation, and lessons learned into your IR process. (NIST Special Publication 800-53 Revision 5)
Key takeaways:
- Define which configuration settings matter, what “unauthorized” means, and who can approve changes.
- Detect config drift and tampering, then generate incident tickets with clear severity and ownership.
- Retain evidence that detections are reviewed, investigated, and drive corrective actions. (NIST Special Publication 800-53 Revision 5)
SI-7(7) is a tight requirement with a common failure mode: teams detect configuration drift, but they treat it as hygiene work, not incident response input. Auditors and assessors will look for a closed loop: (1) you define baseline configuration settings, (2) you detect organization-defined unauthorized changes to those settings, and (3) those detections are incorporated into incident response workflows, not left in a dashboard. (NIST Special Publication 800-53 Revision 5)
This page is written for a Compliance Officer, CCO, or GRC lead who needs to operationalize quickly in a FedRAMP context. The goal is practical: translate SI-7(7) into clear decisions, concrete steps, and evidence you can hand to assessors. The “integration” element is where most programs stumble. You will need more than a tool. You need definitions, routing rules, triage criteria, and records showing your incident response capability consumes these detections and produces outcomes: investigation, containment when needed, rollback, and baseline fixes.
If you use Daydream to manage control ownership and evidence collection, treat SI-7(7) as a workflow requirement: detections create tasks, tasks produce artifacts, and artifacts map cleanly to the control narrative.
Regulatory text
Requirement (excerpt): “Incorporate the detection of organization-defined unauthorized changes to established configuration settings into the organizational incident response capability.” (NIST Special Publication 800-53 Revision 5)
Operator meaning: You must (a) decide which configuration settings are “established,” (b) define what changes are “unauthorized,” (c) detect those changes, and (d) feed that detection into incident response so it is triaged, investigated, escalated, and documented like other security-relevant events. (NIST Special Publication 800-53 Revision 5)
Plain-English interpretation (what this really requires)
This enhancement sits at the boundary between configuration management, monitoring, and incident response. The requirement is not “have a baseline.” It is not “run scans.” It is “unauthorized configuration change detection must produce an incident response action.”
In practice, your assessor will expect to see:
- A defined list of configuration settings that you protect as baselines (examples: IAM policies, logging configuration, endpoint security controls, network security groups, firmware/boot settings where applicable).
- A clear standard for authorization (examples: approved change ticket; approved infrastructure-as-code merge; emergency change process with after-the-fact approval).
- Technical detection (examples: drift detection, file integrity monitoring, policy change detection, privileged activity monitoring).
- IR integration (examples: alert routed to SIEM/SOAR; ticket created; on-call engaged; severity assigned; evidence preserved; root cause and corrective actions tracked). (NIST Special Publication 800-53 Revision 5)
Who it applies to
Entity types: Cloud Service Providers and Federal Agencies operating systems under FedRAMP-aligned NIST SP 800-53 control sets. (NIST Special Publication 800-53 Revision 5)
Operational context where it matters most:
- Cloud control planes and identity systems, where a single unauthorized policy change can expand access.
- Security tooling configurations (logging off, EDR disabled, alert routes changed).
- “Golden images,” templates, and infrastructure-as-code repositories that stamp out system settings at scale.
- Any environment where changes occur frequently and multiple teams have administrative access, including third parties with privileged access.
What you actually need to do (step-by-step)
1) Define “established configuration settings” (scope the baselines)
Create an inventory of configuration baselines that are security-relevant and stable enough to monitor. Keep the list short at first and expand after you prove the workflow.
Minimum set to consider (examples):
- Identity and access: privileged role assignments, MFA enforcement, password policy, API key settings.
- Network: firewall rules, security groups, routing, remote admin exposure.
- Monitoring/security: audit logging enabled, log retention settings, EDR agent health, alert routing destinations.
- Platform hardening: OS hardening settings, critical services enabled/disabled, kernel module settings (where applicable).
- CI/CD and IaC: branch protections, pipeline permissions, secret-scanning settings.
Artifact: “Configuration Baseline Register” with: setting name, system/component, owner, intended value, change authority, and detection method.
2) Define “unauthorized change” in a way responders can apply
Write a short standard that makes authorization testable.
Authorization rules (pick what matches your ops model):
- Authorized if implemented via approved change ticket referencing the baseline item.
- Authorized if merged via approved pull request in IaC repo with required reviewers.
- Authorized if executed by break-glass account and followed by post-incident review within your emergency change process.
- Unauthorized if performed outside these paths, by unapproved identities, or outside approved windows.
Hangup to avoid: “Unauthorized = any change not approved” is not enough unless your approval evidence is reliably captured and correlated to the event.
Artifacts: change management procedure excerpt; RACI for baseline approvals; list of authorized change mechanisms.
3) Implement detection for those unauthorized changes
You can satisfy detection with different technical patterns. The key is that detection is reliable and produces an event record you can tie to follow-up actions.
Common detection patterns:
- Policy/config change event monitoring: Subscribe to configuration change events in your platform and forward to centralized logging.
- Drift detection against desired state: Compare runtime settings to an approved baseline (especially for IaC-managed environments).
- File integrity monitoring (FIM): Monitor critical config files and security tooling configurations.
- Privileged activity monitoring: Detect and alert when privileged identities change baseline items.
Decision point: If you can only do one early, prioritize control-plane configuration change monitoring for IAM, logging, and network exposure.
Artifacts: monitoring architecture diagram; alert rules; sample event payloads; log forwarding proof.
4) Integrate detections into incident response (the SI-7(7) core)
This is the “incorporate into IR capability” requirement. Build an explicit bridge between config-change detections and IR workflows.
Operational steps:
- Event routing: Send unauthorized-change detections to the system your responders actually work from (SIEM/SOAR, ticketing, or IR platform).
- Triage playbooks: Create a short runbook per baseline category (IAM, logging, network). Include: validation steps, containment options, rollback steps, and evidence to preserve.
- Severity model: Define when an unauthorized change becomes an incident vs. a lower-severity security event. Make it deterministic (for example: disabling logging is high priority; benign drift in a non-production setting may be lower).
- Escalation: Map alert types to on-call rotations and required response roles (security operations, cloud platform team, IAM, application owner).
- Case management: Require a case/ticket for each confirmed unauthorized change with disposition (true positive, authorized change with missing paperwork, false positive).
- Lessons learned and corrective actions: Track fixes, such as tightening IAM permissions, improving change approval workflows, or expanding baseline coverage. (NIST Special Publication 800-53 Revision 5)
Daydream fit (practical): Use Daydream to assign control ownership (SecOps + Platform), collect alert samples and closed tickets as recurring evidence, and keep the “unauthorized change definition” and baseline register version-controlled as assessable artifacts.
5) Test the workflow and prove it works
Run a controlled exercise that generates an unauthorized-change detection and confirm it flows end-to-end.
Test ideas:
- Change a security group rule outside the approved path.
- Disable an audit log setting in a test account.
- Modify an IAM policy in a non-production environment with the wrong identity.
Evidence expectation: a detection record, an IR ticket, triage notes, and corrective action, even if containment is “rollback and document.”
Required evidence and artifacts to retain
Assessors typically want evidence across definition, detection, and response. Keep it tight and repeatable.
Core artifacts:
- Configuration Baseline Register (what settings are established and monitored).
- Unauthorized change definition and authorization mechanisms (change tickets/IaC PR approvals/emergency change process).
- Monitoring and alerting configuration for unauthorized changes (rules, queries, policies).
- Log samples showing detected unauthorized changes (with timestamps, actor identity, affected resource).
- Incident response procedures showing intake of these events (playbooks, triage criteria).
- Closed tickets/cases demonstrating review, investigation, and disposition.
- Corrective action records and follow-up validation (e.g., permission change, rule tuning). (NIST Special Publication 800-53 Revision 5)
Common exam/audit questions and hangups
What auditors ask:
- “Show me which configuration settings you treat as established baselines, and who approves changes.”
- “How do you detect unauthorized changes? Show alerts and the underlying rule logic.”
- “Prove these detections are incorporated into incident response. Where is the ticket? Who triaged it? What was the outcome?”
- “How do you distinguish unauthorized from authorized-but-undocumented changes?”
- “How do you ensure third-party administrators follow the authorized change path?”
Typical hangups:
- Alerts exist, but no IR tickets exist.
- Tickets exist, but they are IT change tickets, not security event/incident workflow.
- Unauthorized is defined vaguely, so responders cannot apply it consistently.
- Baselines are too broad, producing noise and alert fatigue.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating drift detection as compliance-only.
Avoidance: require a security case for confirmed unauthorized change detections, even if the fix is a rollback. -
Mistake: Monitoring without ownership.
Avoidance: assign an accountable resolver group per baseline category and document it in the runbook. -
Mistake: No linkage to authorization evidence.
Avoidance: embed change-ticket IDs or PR links into deployment metadata; require responders to check for that reference during triage. -
Mistake: Baselines defined as “everything.”
Avoidance: start with high-impact settings (IAM, logging, network exposure), then expand once signal quality is acceptable. -
Mistake: Ignoring third-party privileged access paths.
Avoidance: require third parties to use the same change controls and ensure their admin actions are monitored and attributable.
Enforcement context and risk implications
No public enforcement cases were provided in the approved source catalog for this requirement, so this page does not cite specific actions.
Operationally, unauthorized configuration changes are a common way to disable security controls, expand privileges, expose services, or break auditability. SI-7(7) reduces risk by forcing “config tampering” into the same muscle memory as other security incidents: detect, triage, contain, recover, and learn. (NIST Special Publication 800-53 Revision 5)
Practical 30/60/90-day execution plan
First 30 days (foundation and scope)
- Publish the initial Configuration Baseline Register for a narrow set of high-risk settings (IAM, logging, network exposure).
- Define “unauthorized change” and the acceptable authorization paths (change tickets, IaC PRs, emergency changes).
- Confirm logs/events for configuration changes are centrally collected and searchable.
- Draft IR triage playbooks for each baseline category and assign ownership.
Next 60 days (integration and evidence)
- Implement alert rules for unauthorized changes and route them into your IR intake system with required fields (resource, actor, baseline item, timestamp).
- Run at least one tabletop or controlled test to prove end-to-end flow from detection to ticket closure.
- Tune alert thresholds and reduce false positives by correlating to approved change identifiers.
- Start producing a monthly review pack: alerts generated, dispositions, and corrective actions.
By 90 days (operational maturity)
- Expand baseline coverage to additional services and environments based on risk.
- Add automated rollback or containment steps for certain classes of unauthorized changes where safe.
- Establish recurring governance: trend review, root cause themes, and updates to baselines and playbooks.
- Use Daydream (or your GRC system) to standardize evidence requests and keep an assessor-ready binder of artifacts and samples aligned to SI-7(7). (NIST Special Publication 800-53 Revision 5)
Frequently Asked Questions
What counts as an “unauthorized change” if we allow emergency break-glass access?
Treat break-glass as authorized only if it follows your emergency change process, including documented justification and after-the-fact approval. Any break-glass change without the required follow-up should be classified as unauthorized for SI-7(7) handling. (NIST Special Publication 800-53 Revision 5)
Do all unauthorized changes have to be declared a formal incident?
SI-7(7) requires incorporation into incident response capability, which you can implement as “security events” that follow IR intake and triage. Define clear criteria for when an event escalates to an incident and document that decision in the case record. (NIST Special Publication 800-53 Revision 5)
Can change management tickets alone satisfy the requirement?
No. Change tickets show authorization, not detection. You need monitoring that detects organization-defined unauthorized changes and proof those detections flow into IR workflows. (NIST Special Publication 800-53 Revision 5)
We use infrastructure-as-code. Does drift detection satisfy SI-7(7)?
Drift detection can satisfy the detection element if it reliably identifies unauthorized deviations from established settings. You still need to route drift findings into IR triage, track disposition, and retain evidence of investigation and corrective actions. (NIST Special Publication 800-53 Revision 5)
How do we handle third parties with admin access in a managed service?
Require third parties to use your approved change paths (tickets or controlled repos) and ensure their privileged actions are logged, attributable, and monitored for baseline impact. Treat unauthorized third-party changes the same as internal ones for IR intake and follow-up. (NIST Special Publication 800-53 Revision 5)
What evidence is most persuasive to an assessor for “integration”?
A small set of closed cases tied to actual alert artifacts is usually strongest: alert record, triage notes, authorization check, containment/rollback decision, and corrective action. Pair those with the runbook that instructs responders to handle unauthorized configuration changes. (NIST Special Publication 800-53 Revision 5)
Frequently Asked Questions
What counts as an “unauthorized change” if we allow emergency break-glass access?
Treat break-glass as authorized only if it follows your emergency change process, including documented justification and after-the-fact approval. Any break-glass change without the required follow-up should be classified as unauthorized for SI-7(7) handling. (NIST Special Publication 800-53 Revision 5)
Do all unauthorized changes have to be declared a formal incident?
SI-7(7) requires incorporation into incident response capability, which you can implement as “security events” that follow IR intake and triage. Define clear criteria for when an event escalates to an incident and document that decision in the case record. (NIST Special Publication 800-53 Revision 5)
Can change management tickets alone satisfy the requirement?
No. Change tickets show authorization, not detection. You need monitoring that detects organization-defined unauthorized changes and proof those detections flow into IR workflows. (NIST Special Publication 800-53 Revision 5)
We use infrastructure-as-code. Does drift detection satisfy SI-7(7)?
Drift detection can satisfy the detection element if it reliably identifies unauthorized deviations from established settings. You still need to route drift findings into IR triage, track disposition, and retain evidence of investigation and corrective actions. (NIST Special Publication 800-53 Revision 5)
How do we handle third parties with admin access in a managed service?
Require third parties to use your approved change paths (tickets or controlled repos) and ensure their privileged actions are logged, attributable, and monitored for baseline impact. Treat unauthorized third-party changes the same as internal ones for IR intake and follow-up. (NIST Special Publication 800-53 Revision 5)
What evidence is most persuasive to an assessor for “integration”?
A small set of closed cases tied to actual alert artifacts is usually strongest: alert record, triage notes, authorization check, containment/rollback decision, and corrective action. Pair those with the runbook that instructs responders to handle unauthorized configuration changes. (NIST Special Publication 800-53 Revision 5)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream