CM: Configuration Management
Controls
CM-1: Policy and Procedures
Baseline(s):
- Low
- Moderate
- High
- Privacy
Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: [Assignment (one or more): organization-level, mission/business process-level, system-level] configuration management policy that: Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and Procedures to facilitate the implementation…
CM-2: Baseline Configuration
Baseline(s):
- Low
- Moderate
- High
Develop, document, and maintain under configuration control, a current baseline configuration of the system; and Review and update the baseline configuration of the system: [Assignment: organization-defined frequency]; When required due to [Assignment: organization-defined circumstances]; and When system components are installed or upgraded.
CM-3: Configuration Change Control
Baseline(s):
- Moderate
- High
Determine and document the types of changes to the system that are configuration-controlled; Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses; Document configuration change decisions associated with the system; Implement approved configuration-controlled changes to the system; Retain records of configuration-controlled changes…
CM-4: Impact Analyses
Baseline(s):
- Low
- Moderate
- High
- Privacy
Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.
CM-5: Access Restrictions for Change
Baseline(s):
- Low
- Moderate
- High
Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.
CM-6: Configuration Settings
Baseline(s):
- Low
- Moderate
- High
Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using [Assignment: organization-defined common secure configurations]; Implement the configuration settings; Identify, document, and approve any deviations from established configuration settings for [Assignment: organization-defined system components] based on [Assignment: organization-defined operational requirements]; and Monitor and…
CM-7: Least Functionality
Baseline(s):
- Low
- Moderate
- High
Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].
CM-8: System Component Inventory
Baseline(s):
- Low
- Moderate
- High
Develop and document an inventory of system components that: Accurately reflects the system; Includes all components within the system; Does not include duplicate accounting of components or components assigned to any other system; Is at the level of granularity deemed necessary for tracking and reporting; and Includes the following information to achieve system component accountability:…
CM-9: Configuration Management Plan
Baseline(s):
- Moderate
- High
Develop, document, and implement a configuration management plan for the system that: Addresses roles, responsibilities, and configuration management processes and procedures; Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items; Defines the configuration items for the system and places the configuration items…
CM-10: Software Usage Restrictions
Baseline(s):
- Low
- Moderate
- High
Use software and associated documentation in accordance with contract agreements and copyright laws; Track the use of software and associated documentation protected by quantity licenses to control copying and distribution; and Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance,…
CM-11: User-installed Software
Baseline(s):
- Low
- Moderate
- High
Establish [Assignment: organization-defined policies] governing the installation of software by users; Enforce software installation policies through the following methods: [Assignment: organization-defined methods]; and Monitor policy compliance [Assignment: organization-defined frequency].
CM-12: Information Location
Baseline(s):
- Moderate
- High
Identify and document the location of [Assignment: organization-defined information] and the specific system components on which the information is processed and stored; Identify and document the users who have access to the system and system components where the information is processed and stored; and Document changes to the location (i.e., system or system components) where…
CM-13: Data Action Mapping
Baseline(s):
Develop and document a map of system data actions.
CM-14: Signed Components
Baseline(s):
Prevent the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.