6. Integrity of Critical Software and Critical Game Data
Authentication of Critical Software
6.1.1 A mechanism shall be built into the ELS to verify the integrity of the Critical Software that is deployed to production, including before changes are implemented as well as on an ongoing basis, to ensure approved software is being used with no unauthorized changes.
6.1.2 At a minimum, the ELS must be successfully authenticated: