Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: CM-FAMILY: CONFIGURATION MANAGEMENT

CM-6(2) CONFIGURATION SETTINGS  |  RESPOND TO UNAUTHORIZED CHANGES

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

cm-6(2)

configuration settings  | respond to unauthorized changes

 

assessment objective:

Determine if the organization:

cm-6(2)[1]

defines configuration settings that, if modified by unauthorized changes, result in organizational security safeguards being employed to respond to such changes;

cm-6(2)[2]

defines security safeguards to be employed to respond to unauthorized changes to organization-defined configuration settings; and

cm-6(2)[3]

employs organization-defined security safeguards to respond to unauthorized changes to organization-defined configuration settings.

potential assessment methods and objects:

Examine: [select from: Configuration management policy; procedures addressing configuration settings for the information system; configuration management plan; security plan; information system design documentation; information system configuration settings and associated documentation; alerts/notifications of unauthorized changes to information system configuration settings; documented responses to unauthorized changes to information system configuration settings; change control records; information system audit records; other relevant documents or records].

Interview: [select from: Organizational personnel with security configuration management responsibilities; organizational personnel with information security responsibilities; system/network administrators].

Test: [select from: Organizational process for responding to unauthorized changes to information system configuration settings; automated mechanisms supporting and/or implementing security safeguards for response to unauthorized changes].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056