Skip to main content

💼 CM Configuration Management

  • ID: /frameworks/nist-sp-800-53-r5/cm

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-c1a6eced

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CM-1 Policy and Procedures3no data
💼 CM-2 Baseline Configuration729no data
 💼 CM-2(1) Baseline Configuration _ Reviews and Updatesno data
 💼 CM-2(2) Baseline Configuration _ Automation Support for Accuracy and Currency16no data
 💼 CM-2(3) Baseline Configuration _ Retention of Previous Configurationsno data
 💼 CM-2(4) Baseline Configuration _ Unauthorized Softwareno data
 💼 CM-2(5) Baseline Configuration _ Authorized Softwareno data
 💼 CM-2(6) Baseline Configuration _ Development and Test Environmentsno data
 💼 CM-2(7) Baseline Configuration _ Configure Systems and Components for High-risk Areasno data
💼 CM-3 Configuration Change Control81725no data
 💼 CM-3(1) Configuration Change Control _ Automated Documentation, Notification, and Prohibition of Changesno data
 💼 CM-3(2) Configuration Change Control _ Testing, Validation, and Documentation of Changesno data
 💼 CM-3(3) Configuration Change Control _ Automated Change Implementationno data
 💼 CM-3(4) Configuration Change Control _ Security and Privacy Representativesno data
 💼 CM-3(5) Configuration Change Control _ Automated Security Responseno data
 💼 CM-3(6) Configuration Change Control _ Cryptography Management6no data
 💼 CM-3(7) Configuration Change Control _ Review System Changesno data
 💼 CM-3(8) Configuration Change Control _ Prevent or Restrict Configuration Changesno data
💼 CM-4 Impact Analyses2no data
 💼 CM-4(1) Impact Analyses _ Separate Test Environmentsno data
 💼 CM-4(2) Impact Analyses _ Verification of Controlsno data
💼 CM-5 Access Restrictions for Change7no data
 💼 CM-5(1) Access Restrictions for Change _ Automated Access Enforcement and Audit Recordsno data
 💼 CM-5(2) Access Restrictions for Change _ Review System Changesno data
 💼 CM-5(3) Access Restrictions for Change _ Signed Componentsno data
 💼 CM-5(4) Access Restrictions for Change _ Dual Authorizationno data
 💼 CM-5(5) Access Restrictions for Change _ Privilege Limitation for Production and Operationno data
 💼 CM-5(6) Access Restrictions for Change _ Limit Library Privilegesno data
 💼 CM-5(7) Access Restrictions for Change _ Automatic Implementation of Security Safeguardsno data
💼 CM-6 Configuration Settings412no data
 💼 CM-6(1) Configuration Settings _ Automated Management, Application, and Verification1no data
 💼 CM-6(2) Configuration Settings _ Respond to Unauthorized Changesno data
 💼 CM-6(3) Configuration Settings _ Unauthorized Change Detectionno data
 💼 CM-6(4) Configuration Settings _ Conformance Demonstrationno data
💼 CM-7 Least Functionality923no data
 💼 CM-7(1) Least Functionality _ Periodic Reviewno data
 💼 CM-7(2) Least Functionality _ Prevent Program Executionno data
 💼 CM-7(3) Least Functionality _ Registration Complianceno data
 💼 CM-7(4) Least Functionality _ Unauthorized Software — Deny-by-exceptionno data
 💼 CM-7(5) Least Functionality _ Authorized Software — Allow-by-exceptionno data
 💼 CM-7(6) Least Functionality _ Confined Environments with Limited Privilegesno data
 💼 CM-7(7) Least Functionality _ Code Execution in Protected Environmentsno data
 💼 CM-7(8) Least Functionality _ Binary or Machine Executable Codeno data
 💼 CM-7(9) Least Functionality _ Prohibiting The Use of Unauthorized Hardwareno data
💼 CM-8 System Component Inventory95no data
 💼 CM-8(1) System Component Inventory _ Updates During Installation and Removal2no data
 💼 CM-8(2) System Component Inventory _ Automated Maintenance1no data
 💼 CM-8(3) System Component Inventory _ Automated Unauthorized Component Detection1no data
 💼 CM-8(4) System Component Inventory _ Accountability Informationno data
 💼 CM-8(5) System Component Inventory _ No Duplicate Accounting of Componentsno data
 💼 CM-8(6) System Component Inventory _ Assessed Configurations and Approved Deviationsno data
 💼 CM-8(7) System Component Inventory _ Centralized Repositoryno data
 💼 CM-8(8) System Component Inventory _ Automated Location Trackingno data
 💼 CM-8(9) System Component Inventory _ Assignment of Components to Systemsno data
💼 CM-9 Configuration Management Plan18no data
 💼 CM-9(1) Configuration Management Plan _ Assignment of Responsibilityno data
💼 CM-10 Software Usage Restrictions1no data
 💼 CM-10(1) Software Usage Restrictions _ Open-source Softwareno data
💼 CM-11 User-installed Software3no data
 💼 CM-11(1) User-installed Software _ Alerts for Unauthorized Installationsno data
 💼 CM-11(2) User-installed Software _ Software Installation with Privileged Statusno data
 💼 CM-11(3) User-installed Software _ Automated Enforcement and Monitoringno data
💼 CM-12 Information Location1no data
 💼 CM-12(1) Information Location _ Automated Tools to Support Information Locationno data
💼 CM-13 Data Action Mappingno data
💼 CM-14 Signed Componentsno data