Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: CM-FAMILY: CONFIGURATION MANAGEMENT

CM-7(4) LEAST FUNCTIONALITY  |  UNAUTHORIZED SOFTWARE (BLACKLISTING)

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

cm-7(4)

least functionality  | unauthorized software (blacklisting)

 

assessment objective:

Determine if the organization:

cm-7(4)(a)

Identifies/defines software programs not authorized to execute on the information system;

cm-7(4)(b)

employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system;

cm-7(4)(c)

cm-7(4)(c)[1]

defines the frequency to review and update the list of unauthorized software programs on the information system; and

cm-7(4)(c)[2]

reviews and updates the list of unauthorized software programs with the organization-defined frequency.

potential assessment methods and objects:

Examine: [SELECT FROM: Configuration management policy; procedures addressing least functionality in the information system; configuration management plan; information system design documentation; information system configuration settings and associated documentation; list of software programs not authorized to execute on the information system; security configuration checklists; review and update records associated with list of unauthorized software programs; change control records; information system audit records; other relevant documents or records].

Interview: [select from: Organizational personnel with responsibilities for identifying software not authorized to execute on the information system; organizational personnel with information security responsibilities; system/network administrators].

Test: [select from: Organizational process for identifying, reviewing, and updating programs not authorized to execute on the information system; organizational process for implementing blacklisting; automated mechanisms supporting and/or implementing blacklisting].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056