Skip to main content

πŸ’Ό CM-7 Least Functionality

  • Contextual name: πŸ’Ό CM-7 Least Functionality
  • ID: /frameworks/nist-sp-800-53-r5/cm/07
  • Located in: πŸ’Ό CM Configuration Management

Description​

a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/ec2/19
    • /frameworks/aws-fsbp-v1.0.0/ec2/21
    • /frameworks/aws-fsbp-v1.0.0/transfer-family/02
  • Internal
    • ID: dec-c-cc3ad3f4

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EC2.19] Security groups should not allow unrestricted access to ports with high risk10
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [EC2.21] Network ACLs should not allow ingress from 0.0.0.0/0 to port 22 or port 33891
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Transfer.2] Transfer Family servers should not use FTP protocol for endpoint connection

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-7 Least Functionality (L)(M)(H)31821
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό CM-7 Least Functionality (L)(M)(H)18

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CM-7(1) Least Functionality _ Periodic Review
πŸ’Ό CM-7(2) Least Functionality _ Prevent Program Execution
πŸ’Ό CM-7(3) Least Functionality _ Registration Compliance
πŸ’Ό CM-7(4) Least Functionality _ Unauthorized Software β€” Deny-by-exception
πŸ’Ό CM-7(5) Least Functionality _ Authorized Software β€” Allow-by-exception
πŸ’Ό CM-7(6) Least Functionality _ Confined Environments with Limited Privileges
πŸ’Ό CM-7(7) Least Functionality _ Code Execution in Protected Environments
πŸ’Ό CM-7(8) Least Functionality _ Binary or Machine Executable Code
πŸ’Ό CM-7(9) Least Functionality _ Prohibiting The Use of Unauthorized Hardware

Policies (11)​

PolicyLogic CountFlags
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted CIFS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted FTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted RPC traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted SMTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MySQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted Telnet traffic 🟒1🟒 x6
πŸ“ AWS VPC Network ACL exposes admin ports to public internet ports 🟒1🟒 x6