Skip to main content

πŸ’Ό CM-3 Configuration Change Control

  • Contextual name: πŸ’Ό CM-3 Configuration Change Control
  • ID: /frameworks/nist-sp-800-53-r5/cm/03
  • Located in: πŸ’Ό CM Configuration Management

Description​

a. Determine and document the types of changes to the system that are configuration-controlled; b. Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses; c. Document configuration change decisions associated with the system; d. Implement approved configuration-controlled changes to the system; e. Retain records of configuration-controlled changes to the system for [Assignment: organization-defined time period]; f. Monitor and review activities associated with configuration-controlled changes to the system; and g. Coordinate and provide oversight for configuration change control activities through [Assignment: organization-defined configuration change control element] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; when [Assignment: organization-defined configuration change conditions]].

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/config/01
    • /frameworks/aws-fsbp-v1.0.0/documentdb/05
    • /frameworks/aws-fsbp-v1.0.0/dynamodb/06
    • /frameworks/aws-fsbp-v1.0.0/elb/06
    • /frameworks/aws-fsbp-v1.0.0/mq/03
    • /frameworks/aws-fsbp-v1.0.0/neptune/04
    • /frameworks/aws-fsbp-v1.0.0/network-firewall/09
    • /frameworks/aws-fsbp-v1.0.0/network-firewall/10
    • /frameworks/aws-fsbp-v1.0.0/rds/07
    • /frameworks/aws-fsbp-v1.0.0/rds/08
  • Internal
    • ID: dec-c-b9c9dbc4

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Config.1] AWS Config should be enabled and use the service-linked role for resource recording1
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DocumentDB.5] Amazon DocumentDB clusters should have deletion protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DynamoDB.6] DynamoDB tables should have deletion protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ELB.6] Application, Gateway, and Network Load Balancers should have deletion protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [MQ.3] Amazon MQ brokers should have automatic minor version upgrade enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Neptune.4] Neptune DB clusters should have deletion protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [NetworkFirewall.9] Network Firewall firewalls should have deletion protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [NetworkFirewall.10] Network Firewall firewalls should have subnet change protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.7] RDS clusters should have deletion protection enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.8] RDS DB instances should have deletion protection enabled

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-3 Configuration Change Control (M)(H)421
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-01: Networks and network services are monitored to find potentially adverse events83
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events89
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked24

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CM-3(1) Configuration Change Control _ Automated Documentation, Notification, and Prohibition of Changes
πŸ’Ό CM-3(2) Configuration Change Control _ Testing, Validation, and Documentation of Changes
πŸ’Ό CM-3(3) Configuration Change Control _ Automated Change Implementation
πŸ’Ό CM-3(4) Configuration Change Control _ Security and Privacy Representatives
πŸ’Ό CM-3(5) Configuration Change Control _ Automated Security Response
πŸ’Ό CM-3(6) Configuration Change Control _ Cryptography Management4
πŸ’Ό CM-3(7) Configuration Change Control _ Review System Changes
πŸ’Ό CM-3(8) Configuration Change Control _ Prevent or Restrict Configuration Changes

Policies (17)​

PolicyLogic CountFlags
πŸ“ AWS Account Config is not enabled in all regions 🟒1🟒 x6
πŸ“ AWS Account Multi-Region CloudTrail is not enabled 🟒1🟒 x6
πŸ“ AWS API Gateway API Access Logging in CloudWatch is not enabled 🟒1🟠 x1, 🟒 x5
πŸ“ AWS CloudTrail S3 Bucket Access Logging is not enabled. 🟒1🟒 x6
πŸ“ AWS S3 Bucket Server Access Logging is not enabled 🟒1🟒 x6
πŸ“ AWS VPC Flow Logs are not enabled 🟒1🟠 x1, 🟒 x5
πŸ“ Azure Diagnostic Setting captures Administrative, Alert, Policy, and Security categories 🟒1🟒 x6
πŸ“ Azure Diagnostic Setting for Azure Key Vault is not enabled 🟒🟒 x3
πŸ“ Azure Network Security Group Flow Logs retention period is less than 90 days 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server log_checkpoints Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server log_retention_days Parameter is less than 4 days 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server log_connections Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server log_disconnections Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure SQL Server Auditing is not enabled 🟒1🟒 x6
πŸ“ Azure SQL Server Auditing Retention is less than 90 days 🟒1🟒 x6
πŸ“ Azure Storage Blob Logging is not enabled for Read, Write, and Delete requests 🟒1🟒 x6
πŸ“ Azure Storage Queue Logging is not enabled for Read, Write, and Delete requests 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0c82d7751
βœ‰οΈ dec-x-9b79d91f1
βœ‰οΈ dec-x-9c0416671
βœ‰οΈ dec-x-24bba4831
βœ‰οΈ dec-x-36ced3d11
βœ‰οΈ dec-x-89d5ed7a1
βœ‰οΈ dec-x-611eaa351
βœ‰οΈ dec-x-1518c16e1
βœ‰οΈ dec-x-a193b20f1
βœ‰οΈ dec-x-b2ce0ca11
βœ‰οΈ dec-x-d75f6d861
βœ‰οΈ dec-x-db1b7a1b1
βœ‰οΈ dec-x-e5c05d3e1
βœ‰οΈ dec-x-e00143332
βœ‰οΈ dec-z-3f480eb51