Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: APPENDIX E: TAILORING CRITERIA

Configuration Management Policy and Procedures

Scroll Prev Top Next More

Table E-5: Tailoring Actions for Configuration Management Controls35

NIST SP 800-53

MODERATE BASELINE SECURITY CONTROLS

TAILORING
ACTION

CM-1

Configuration Management Policy and Procedures

NFO

CM-2

Baseline Configuration

CUI

CM-2(1)

BASELINE CONFIGURATION | REVIEWS AND UPDATES

NFO

CM-2(3)

BASELINE CONFIGURATION | RETENTION OF PREVIOUS CONFIGURATIONS

NCO

CM-2(7)

BASELINE CONFIGURATION | CONFIGURE SYSTEMS, COMPONENTS, OR DEVICES FOR HIGH-RISK AREAS

NFO

CM-3

Configuration Change Control

CUI

CM-3(2)

CONFIGURATION CHANGE CONTROL | TEST / VALIDATE / DOCUMENT CHANGES

NFO

CM-4

Security Impact Analysis

CUI

CM-5

Access Restrictions for Change

CUI

CM-6

Configuration Settings

CUI

CM-7

Least Functionality

CUI

CM-7(1)

LEAST FUNCTIONALITY | PERIODIC REVIEW

CUI

CM-7(2)

LEAST FUNCTIONALITY | PREVENT PROGRAM EXECUTION

CUI

CM-7(4)(5)

LEAST FUNCTIONALITY | UNAUTHORIZED OR AUTHORIZED SOFTWARE / BLACKLISTING OR WHITELISTING

CUI

CM-8

Information System Component Inventory

CUI

CM-8(1)

INFORMATION SYSTEM COMPONENT INVENTORY | UPDATES DURING INSTALLATIONS / REMOVALS

CUI

CM-8(3)

INFORMATION SYSTEM COMPONENT INVENTORY | AUTOMATED UNAUTHORIZED COMPONENT DETECTION

NCO

CM-8(5)

INFORMATION SYSTEM COMPONENT INVENTORY | NO DUPLICATE ACCOUNTING OF COMPONENTS

NFO

CM-9

Configuration Management Plan

NFO

CM-10

Software Usage Restrictions

NCO

CM-11

User-Installed Software

CUI


 

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056