Checking the valid syntax and semantics of system inputs—including character set, length, numerical range, and acceptable values—verifies that inputs match specified definitions for format and content. Input validation ensures accurate and correct inputs and prevents attacks such as cross-site scripting and a variety of injection attacks.


  • The information resource owner, or designee, is responsible for ensuring that the measures described in this Control are implemented. The intended audience for this Control includes, but is not limited to, all information resource owners and custodians.


  • 1

    The information resource owner, or designee shall, when possible, check the validity of the information inputs.