Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: CM-FAMILY: CONFIGURATION MANAGEMENT

CM-7(5) LEAST FUNCTIONALITY  |  AUTHORIZED SOFTWARE (WHITELISTING)

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

cm-7(5)

least functionality  | authorized software (whitelisting)

 

assessment objective:

Determine if the organization:

cm-7(5)(a)

Identifies/defines software programs authorized to execute on the information system;

cm-7(5)(b)

employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system;

cm-7(5)(c)

cm-7(5)(c)[1]

defines the frequency to review and update the list of authorized software programs on the information system; and

cm-7(5)(c)[2]

reviews and updates the list of authorized software programs with the organization-defined frequency.

potential assessment methods and objects:

Examine: [SELECT FROM: Configuration management policy; procedures addressing least functionality in the information system; configuration management plan; information system design documentation; information system configuration settings and associated documentation; list of software programs authorized to execute on the information system; security configuration checklists; review and update records associated with list of authorized software programs; change control records; information system audit records; other relevant documents or records].

Interview: [select from: Organizational personnel with responsibilities for identifying software authorized to execute on the information system; organizational personnel with information security responsibilities; system/network administrators].

Test: [select from: Organizational process for identifying, reviewing, and updating programs authorized to execute on the information system; organizational process for implementing whitelisting; automated mechanisms implementing whitelisting].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056