๐ผ CM-1 CONFIGURATION MANAGEMENT POLICY AND PROCEDURES | | | | |
๐ผ CM-2 BASELINE CONFIGURATION | 7 | 1 | 1 | |
๐ผ CM-2 (1) REVIEWS AND UPDATES | | | | |
๐ผ CM-2 (2) AUTOMATION SUPPORT FOR ACCURACY _ CURRENCY | | | | |
๐ผ CM-2 (3) RETENTION OF PREVIOUS CONFIGURATIONS | | | | |
๐ผ CM-2 (4) UNAUTHORIZED SOFTWARE | | | | |
๐ผ CM-2 (5) AUTHORIZED SOFTWARE | | | | |
๐ผ CM-2 (6) DEVELOPMENT AND TEST ENVIRONMENTS | | | | |
๐ผ CM-2 (7) CONFIGURE SYSTEMS, COMPONENTS, OR DEVICES FOR HIGH-RISK AREAS | | | | |
๐ผ CM-3 CONFIGURATION CHANGE CONTROL | 6 | | | |
๐ผ CM-3 (1) AUTOMATED DOCUMENT _ NOTIFICATION _ PROHIBITION OF CHANGES | | | | |
๐ผ CM-3 (2) TEST _ VALIDATE _ DOCUMENT CHANGES | | | | |
๐ผ CM-3 (3) AUTOMATED CHANGE IMPLEMENTATION | | | | |
๐ผ CM-3 (4) SECURITY REPRESENTATIVE | | | | |
๐ผ CM-3 (5) AUTOMATED SECURITY RESPONSE | | | | |
๐ผ CM-3 (6) CRYPTOGRAPHY MANAGEMENT | | | | |
๐ผ CM-4 SECURITY IMPACT ANALYSIS | 2 | | | |
๐ผ CM-4 (1) SEPARATE TEST ENVIRONMENTS | | | | |
๐ผ CM-4 (2) VERIFICATION OF SECURITY FUNCTIONS | | | | |
๐ผ CM-5 ACCESS RESTRICTIONS FOR CHANGE | 7 | | | |
๐ผ CM-5 (1) AUTOMATED ACCESS ENFORCEMENT _ AUDITING | | | | |
๐ผ CM-5 (2) REVIEW SYSTEM CHANGES | | | | |
๐ผ CM-5 (3) SIGNED COMPONENTS | | | | |
๐ผ CM-5 (4) DUAL AUTHORIZATION | | | | |
๐ผ CM-5 (5) LIMIT PRODUCTION _ OPERATIONAL PRIVILEGES | | | | |
๐ผ CM-5 (6) LIMIT LIBRARY PRIVILEGES | | | | |
๐ผ CM-5 (7) AUTOMATIC IMPLEMENTATION OF SECURITY SAFEGUARDS | | | | |
๐ผ CM-6 CONFIGURATION SETTINGS | 4 | 1 | 1 | |
๐ผ CM-6 (1) AUTOMATED CENTRAL MANAGEMENT _ APPLICATION _ VERIFICATION | | | | |
๐ผ CM-6 (2) RESPOND TO UNAUTHORIZED CHANGES | | | | |
๐ผ CM-6 (3) UNAUTHORIZED CHANGE DETECTION | | | | |
๐ผ CM-6 (4) CONFORMANCE DEMONSTRATION | | | | |
๐ผ CM-7 LEAST FUNCTIONALITY | 5 | 4 | 5 | |
๐ผ CM-7 (1) PERIODIC REVIEW | | 3 | 4 | |
๐ผ CM-7 (2) PREVENT PROGRAM EXECUTION | | | | |
๐ผ CM-7 (3) REGISTRATION COMPLIANCE | | | | |
๐ผ CM-7 (4) UNAUTHORIZED SOFTWARE _ BLACKLISTING | | | | |
๐ผ CM-7 (5) AUTHORIZED SOFTWARE _ WHITELISTING | | | | |
๐ผ CM-8 INFORMATION SYSTEM COMPONENT INVENTORY | 9 | 1 | 2 | |
๐ผ CM-8 (1) UPDATES DURING INSTALLATIONS _ REMOVALS | | | | |
๐ผ CM-8 (2) AUTOMATED MAINTENANCE | | | | |
๐ผ CM-8 (3) AUTOMATED UNAUTHORIZED COMPONENT DETECTION | | | | |
๐ผ CM-8 (4) ACCOUNTABILITY INFORMATION | | | | |
๐ผ CM-8 (5) NO DUPLICATE ACCOUNTING OF COMPONENTS | | | | |
๐ผ CM-8 (6) ASSESSED CONFIGURATIONS _ APPROVED DEVIATIONS | | | | |
๐ผ CM-8 (7) CENTRALIZED REPOSITORY | | | | |
๐ผ CM-8 (8) AUTOMATED LOCATION TRACKING | | | | |
๐ผ CM-8 (9) ASSIGNMENT OF COMPONENTS TO SYSTEMS | | | | |
๐ผ CM-9 CONFIGURATION MANAGEMENT PLAN | 1 | | | |
๐ผ CM-9 (1) ASSIGNMENT OF RESPONSIBILITY | | | | |
๐ผ CM-10 SOFTWARE USAGE RESTRICTIONS | 1 | | | |
๐ผ CM-10 (1) OPEN SOURCE SOFTWARE | | | | |
๐ผ CM-11 USER-INSTALLED SOFTWARE | 2 | | | |
๐ผ CM-11 (1) ALERTS FOR UNAUTHORIZED INSTALLATIONS | | | | |
๐ผ CM-11 (2) PROHIBIT INSTALLATION WITHOUT PRIVILEGED STATUS | | | | |