
PR.IP-1: Information Protection Processes and Procedures
A baseline configuration of information technology/industrial control systems is created and maintained.

PR.DS-8: Data Security
Integrity checking mechanisms are used to verify hardware integrity.

PR.DS-6: Data Security
Integrity checking mechanisms are used to verify software, firmware, and information integrity.

PR.AC-5: Identity Management, Authentication and Access Control
Network integrity is protected (e.g., network segregation, network segmentation).