CM: Configuration Management

Controls

CM-1: Configuration Management Policy And Procedures

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]: A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and Reviews and updates the current: Configuration management policy…

CM-2: Baseline Configuration

Baseline(s):

  • Low
  • Moderate
  • High

The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system.

CM-3: Configuration Change Control

Baseline(s):

  • Moderate
  • High

The organization: Determines the types of changes to the information system that are configuration-controlled; Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses; Documents configuration change decisions associated with the information system; Implements approved configuration-controlled changes to the information system; Retains records of…

CM-4: Security Impact Analysis

Baseline(s):

  • Low
  • Moderate
  • High

The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.

CM-5: Access Restrictions For Change

Baseline(s):

  • Moderate
  • High

The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system.

CM-6: Configuration Settings

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Establishes and documents configuration settings for information technology products employed within the information system using [Assignment: organization-defined security configuration checklists] that reflect the most restrictive mode consistent with operational requirements; Implements the configuration settings; Identifies, documents, and approves any deviations from established configuration settings for [Assignment: organization-defined information system components] based on [Assignment:…

CM-7: Least Functionality

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Configures the information system to provide only essential capabilities; and Prohibits or restricts the use of the following functions, ports, protocols, and/or services: [Assignment: organization-defined prohibited or restricted functions, ports, protocols, and/or services].

CM-8: Information System Component Inventory

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Develops and documents an inventory of information system components that: Accurately reflects the current information system; Includes all components within the authorization boundary of the information system; Is at the level of granularity deemed necessary for tracking and reporting; and Includes [Assignment: organization-defined information deemed necessary to achieve effective information system component accountability];…

CM-9: Configuration Management Plan

Baseline(s):

  • Moderate
  • High

The organization develops, documents, and implements a configuration management plan for the information system that: Addresses roles, responsibilities, and configuration management processes and procedures; Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items; Defines the configuration items for the information system and…

CM-10: Software Usage Restrictions

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Uses software and associated documentation in accordance with contract agreements and copyright laws; Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution,…

CM-11: User-Installed Software

Baseline(s):

  • Low
  • Moderate
  • High

The organization: Establishes [Assignment: organization-defined policies] governing the installation of software by users; Enforces software installation policies through [Assignment: organization-defined methods]; and Monitors policy compliance at [Assignment: organization-defined frequency].