CM: Configuration Management

Controls

CM-1: Policy and Procedures

Baseline(s):

  • Low
  • Moderate
  • High
  • Privacy

Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: [Assignment (one or more): organization-level, mission/business process-level, system-level] configuration management policy that: Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and Procedures to facilitate the implementation…

CM-2: Baseline Configuration

Baseline(s):

  • Low
  • Moderate
  • High

Develop, document, and maintain under configuration control, a current baseline configuration of the system; and Review and update the baseline configuration of the system: [Assignment: organization-defined frequency]; When required due to [Assignment: organization-defined circumstances]; and When system components are installed or upgraded.

CM-3: Configuration Change Control

Baseline(s):

  • Moderate
  • High

Determine and document the types of changes to the system that are configuration-controlled; Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses; Document configuration change decisions associated with the system; Implement approved configuration-controlled changes to the system; Retain records of configuration-controlled changes…

CM-4: Impact Analyses

Baseline(s):

  • Low
  • Moderate
  • High
  • Privacy

Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.

CM-5: Access Restrictions for Change

Baseline(s):

  • Low
  • Moderate
  • High

Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.

CM-6: Configuration Settings

Baseline(s):

  • Low
  • Moderate
  • High

Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using [Assignment: organization-defined common secure configurations]; Implement the configuration settings; Identify, document, and approve any deviations from established configuration settings for [Assignment: organization-defined system components] based on [Assignment: organization-defined operational requirements]; and Monitor and…

CM-7: Least Functionality

Baseline(s):

  • Low
  • Moderate
  • High

Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].

CM-8: System Component Inventory

Baseline(s):

  • Low
  • Moderate
  • High

Develop and document an inventory of system components that: Accurately reflects the system; Includes all components within the system; Does not include duplicate accounting of components or components assigned to any other system; Is at the level of granularity deemed necessary for tracking and reporting; and Includes the following information to achieve system component accountability:…

CM-9: Configuration Management Plan

Baseline(s):

  • Moderate
  • High

Develop, document, and implement a configuration management plan for the system that: Addresses roles, responsibilities, and configuration management processes and procedures; Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items; Defines the configuration items for the system and places the configuration items…

CM-10: Software Usage Restrictions

Baseline(s):

  • Low
  • Moderate
  • High

Use software and associated documentation in accordance with contract agreements and copyright laws; Track the use of software and associated documentation protected by quantity licenses to control copying and distribution; and Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance,…

CM-11: User-installed Software

Baseline(s):

  • Low
  • Moderate
  • High

Establish [Assignment: organization-defined policies] governing the installation of software by users; Enforce software installation policies through the following methods: [Assignment: organization-defined methods]; and Monitor policy compliance [Assignment: organization-defined frequency].

CM-12: Information Location

Baseline(s):

  • Moderate
  • High

Identify and document the location of [Assignment: organization-defined information] and the specific system components on which the information is processed and stored; Identify and document the users who have access to the system and system components where the information is processed and stored; and Document changes to the location (i.e., system or system components) where…

CM-14: Signed Components

Baseline(s):

(Not part of any baseline)

Prevent the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.