💼 CM-7 Least Functionality
- ID:
/frameworks/nist-sp-800-53-r5/cm/07
Description
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].
Similar
- Sections
/frameworks/aws-fsbp-v1.0.0/ec2/19/frameworks/aws-fsbp-v1.0.0/ec2/21/frameworks/aws-fsbp-v1.0.0/transfer-family/02
- Internal
- ID:
dec-c-cc3ad3f4
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EC2.19] Security groups should not allow unrestricted access to ports with high risk | 10 | no data | |||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EC2.21] Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 3389 | 1 | no data | |||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [Transfer.2] Transfer Family servers should not use FTP protocol for endpoint connection | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 FedRAMP High Security Controls → 💼 CM-7 Least Functionality (L)(M)(H) | 3 | 18 | 33 | no data | |
| 💼 FedRAMP Low Security Controls → 💼 CM-7 Least Functionality (L)(M)(H) | 29 | no data |