πΌ ISO/IEC 27001:2013 β πΌ A.12.1.2 Change management | | | | |
πΌ ISO/IEC 27001:2013 β πΌ A.12.5.1 Installation of software on operational systems | | 4 | 4 | |
πΌ ISO/IEC 27001:2013 β πΌ A.12.6.2 Restrictions on software installation | | | | |
πΌ ISO/IEC 27001:2013 β πΌ A.14.2.2 System change control procedures | | | | |
πΌ ISO/IEC 27001:2013 β πΌ A.14.2.3 Technical review of applications after operating platform changes | | | | |
πΌ ISO/IEC 27001:2013 β πΌ A.14.2.4 Restrictions on changes to software packages | | | | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-2 BASELINE CONFIGURATION | 7 | 1 | 1 | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-3 CONFIGURATION CHANGE CONTROL | 6 | | | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-4 SECURITY IMPACT ANALYSIS | 2 | | | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-5 ACCESS RESTRICTIONS FOR CHANGE | 7 | | | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-6 CONFIGURATION SETTINGS | 4 | 1 | 1 | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-7 LEAST FUNCTIONALITY | 5 | 4 | 5 | |
πΌ NIST SP 800-53 Revision 4 β πΌ CM-9 CONFIGURATION MANAGEMENT PLAN | 1 | | | |
πΌ NIST SP 800-53 Revision 4 β πΌ SA-10 DEVELOPER CONFIGURATION MANAGEMENT | 6 | | | |