Skip to main content

💼 CM CONFIGURATION MANAGEMENT

  • ID: /frameworks/nist-sp-800-53-r4/cm

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-f508c0d7

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CM-1 CONFIGURATION MANAGEMENT POLICY AND PROCEDURESno data
💼 CM-2 BASELINE CONFIGURATION711no data
 💼 CM-2 (1) REVIEWS AND UPDATESno data
 💼 CM-2 (2) AUTOMATION SUPPORT FOR ACCURACY _ CURRENCYno data
 💼 CM-2 (3) RETENTION OF PREVIOUS CONFIGURATIONSno data
 💼 CM-2 (4) UNAUTHORIZED SOFTWAREno data
 💼 CM-2 (5) AUTHORIZED SOFTWAREno data
 💼 CM-2 (6) DEVELOPMENT AND TEST ENVIRONMENTSno data
 💼 CM-2 (7) CONFIGURE SYSTEMS, COMPONENTS, OR DEVICES FOR HIGH-RISK AREASno data
💼 CM-3 CONFIGURATION CHANGE CONTROL611no data
 💼 CM-3 (1) AUTOMATED DOCUMENT _ NOTIFICATION _ PROHIBITION OF CHANGESno data
 💼 CM-3 (2) TEST _ VALIDATE _ DOCUMENT CHANGESno data
 💼 CM-3 (3) AUTOMATED CHANGE IMPLEMENTATIONno data
 💼 CM-3 (4) SECURITY REPRESENTATIVEno data
 💼 CM-3 (5) AUTOMATED SECURITY RESPONSEno data
 💼 CM-3 (6) CRYPTOGRAPHY MANAGEMENT11no data
💼 CM-4 SECURITY IMPACT ANALYSIS2no data
 💼 CM-4 (1) SEPARATE TEST ENVIRONMENTSno data
 💼 CM-4 (2) VERIFICATION OF SECURITY FUNCTIONSno data
💼 CM-5 ACCESS RESTRICTIONS FOR CHANGE7no data
 💼 CM-5 (1) AUTOMATED ACCESS ENFORCEMENT _ AUDITINGno data
 💼 CM-5 (2) REVIEW SYSTEM CHANGESno data
 💼 CM-5 (3) SIGNED COMPONENTSno data
 💼 CM-5 (4) DUAL AUTHORIZATIONno data
 💼 CM-5 (5) LIMIT PRODUCTION _ OPERATIONAL PRIVILEGESno data
 💼 CM-5 (6) LIMIT LIBRARY PRIVILEGESno data
 💼 CM-5 (7) AUTOMATIC IMPLEMENTATION OF SECURITY SAFEGUARDSno data
💼 CM-6 CONFIGURATION SETTINGS411no data
 💼 CM-6 (1) AUTOMATED CENTRAL MANAGEMENT _ APPLICATION _ VERIFICATIONno data
 💼 CM-6 (2) RESPOND TO UNAUTHORIZED CHANGESno data
 💼 CM-6 (3) UNAUTHORIZED CHANGE DETECTIONno data
 💼 CM-6 (4) CONFORMANCE DEMONSTRATIONno data
💼 CM-7 LEAST FUNCTIONALITY567no data
 💼 CM-7 (1) PERIODIC REVIEW34no data
 💼 CM-7 (2) PREVENT PROGRAM EXECUTIONno data
 💼 CM-7 (3) REGISTRATION COMPLIANCEno data
 💼 CM-7 (4) UNAUTHORIZED SOFTWARE _ BLACKLISTINGno data
 💼 CM-7 (5) AUTHORIZED SOFTWARE _ WHITELISTINGno data
💼 CM-8 INFORMATION SYSTEM COMPONENT INVENTORY912no data
 💼 CM-8 (1) UPDATES DURING INSTALLATIONS _ REMOVALSno data
 💼 CM-8 (2) AUTOMATED MAINTENANCEno data
 💼 CM-8 (3) AUTOMATED UNAUTHORIZED COMPONENT DETECTIONno data
 💼 CM-8 (4) ACCOUNTABILITY INFORMATIONno data
 💼 CM-8 (5) NO DUPLICATE ACCOUNTING OF COMPONENTSno data
 💼 CM-8 (6) ASSESSED CONFIGURATIONS _ APPROVED DEVIATIONSno data
 💼 CM-8 (7) CENTRALIZED REPOSITORYno data
 💼 CM-8 (8) AUTOMATED LOCATION TRACKINGno data
 💼 CM-8 (9) ASSIGNMENT OF COMPONENTS TO SYSTEMSno data
💼 CM-9 CONFIGURATION MANAGEMENT PLAN1no data
 💼 CM-9 (1) ASSIGNMENT OF RESPONSIBILITYno data
💼 CM-10 SOFTWARE USAGE RESTRICTIONS1no data
 💼 CM-10 (1) OPEN SOURCE SOFTWAREno data
💼 CM-11 USER-INSTALLED SOFTWARE2no data
 💼 CM-11 (1) ALERTS FOR UNAUTHORIZED INSTALLATIONSno data
 💼 CM-11 (2) PROHIBIT INSTALLATION WITHOUT PRIVILEGED STATUSno data