Mechanisms exist to verify the functionality of cybersecurity controls when anomalies are discovered.