Configuration management

On this page

 

The controls and activities in the Configuration management (CM) family support the management and control of all components of the system such as hardware, software, and configuration items.

CM-01 Configuration management policy and procedures

Activity

  1. Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]
    1. [Selection (1 or more): Organization-level; Mission/business process-level; System-level] configuration management policy that
      1. addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance
      2. is consistent with applicable laws, Orders in Council, directives, regulations, policies, standards, and guidelines
    2. procedures to facilitate the implementation of the configuration management policy and the associated configuration management controls
  2. Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the configuration management policy and procedures
  3. Review and update the current configuration management
    1. policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]
    2. procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]

Discussion

Configuration management policy and procedures address the controls in the CM family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of configuration management policy and procedures. In general, security and privacy program policies and procedures at the organization level are preferable and may remove the need for mission- or system-specific policies and procedures.

The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission/business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents.

Events that may precipitate an update to configuration management policy and procedures include, but are not limited to, assessment or audit findings, security incidents or breaches, or changes in applicable laws, Orders in Council, jurisprudence, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.

Related controls and activities

PM-09, PS-08, SA-08, SI-02, SI-12.

Enhancements

None.

References

 

CM-02 Baseline configuration

Control

  1. Develop, document, and maintain under configuration control, a current baseline configuration of the system
  2. Review and update the baseline configuration of the system
    1. [Assignment: organization-defined frequency]
    2. when required due to [Assignment: organization-defined circumstances]
    3. when system components are installed or upgraded

Discussion

Baseline configurations for systems and system components include connectivity, operational, and communications aspects of systems. Baseline configurations are documented, formally reviewed, and agreed-upon specifications for systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, or changes to systems. They include security and privacy control implementations, operational procedures, information about system components, network topology, and logical placement of components in the system architecture. Maintaining baseline configurations requires creating new baselines as organizational systems change over time. Baseline configurations of systems reflect the current enterprise architecture. If the system facilitates the collection or use of personal information, baseline configurations should include providing privacy notice to users.

Related controls and activities

AC-08, AC-19, AU-06, CA-09, CM-01, CM-03, CM-05, CM-06, CM-08, CM-09, CP-09, CP-10, CP-12, MA-02, PL-08, PM-05, SA-08, SA-10, SA-15, SC-18.

Enhancements

  • (01) Baseline configuration: Reviews and updates
    • Withdrawn: Incorporated into CM-02.
  • (02) Baseline configuration: Automation support for accuracy and currency
    • Maintain the currency, completeness, accuracy, and availability of the baseline configuration of the system using [Assignment: organization-defined automated mechanisms].
    • Discussion: Automated mechanisms that help organizations maintain consistent baseline configurations for systems include configuration management tools, hardware, software, firmware inventory tools, and network management tools. Automated tools can be used at the organization level, mission and business process level, or system level on workstations, servers, notebook computers, network components, or mobile devices. Tools can be used to track version numbers on operating systems, applications, types of software installed, and current patch levels. Automation support for accuracy and currency can be satisfied by the implementation of CM-08(02) for organizations that combine system component inventory and baseline configuration activities.
    • Related controls and activities: CM-07, IA-03, RA-05.
  • (03) Baseline configuration: Retention of previous configurations
    • Retain [Assignment: organization-defined number] of previous versions of baseline configurations of the system to support rollback.
    • Discussion: Retaining previous versions of baseline configurations to support rollback include hardware, software, firmware, configuration files, configuration records, and associated documentation.
    • Related controls and activities: None.
  • (04) Baseline configuration: Unauthorized software
    • Withdrawn: Incorporated into CM-07(04).
  • (05) Baseline configuration: Authorized software
    • Withdrawn: Incorporated into CM-07(05).
  • (06) Baseline configuration: Development and test environments
    • Maintain a baseline configuration for system development and test environments that is managed separately from the operational baseline configuration.
    • Discussion: Establishing separate baseline configurations for development, testing, and operational environments protects systems from unplanned or unexpected events related to development and testing activities. Separate baseline configurations allow organizations to apply the configuration management that is most appropriate for each type of configuration. For example, the management of operational configurations typically emphasizes the need for stability, while the management of development or test configurations requires greater flexibility.
      Configurations in the test environment mirror configurations in the operational environment to the extent possible so that the results of the testing are representative of the proposed changes to the operational systems. Separate baseline configurations do not necessarily require separate physical environments.
    • Related controls and activities: CM-04, SC-03, SC-07.
  • (07) Baseline configuration: Configure systems and components for high-risk areas
      1. Issue [Assignment: organization-defined systems or system components] with [Assignment: organization-defined configurations] to individuals traveling to locations that the organization deems to be of significant risk
      2. Apply the following controls to the systems or components when the individuals return from travel: [Assignment: organization-defined controls]
    • Discussion: When it is known that systems or system components will be in high-risk areas external to the organization, additional controls may be implemented to counter the increased threat in such areas. For example, organizations can take actions for notebook computers used by individuals departing on and returning from travel. Actions include determining the locations that are of concern, defining the required configurations for the components, ensuring that components are configured as intended before travel is initiated, and applying controls to the components after travel is completed. Specially configured notebook computers include computers with sanitized hard drives, limited applications, and more stringent configuration settings. Controls applied to mobile devices upon return from travel include examining the mobile device for signs of physical tampering and purging and reimaging disk drives. Protecting information that resides on mobile devices is addressed in the Media protection (MP) family.
    • Related controls and activities: MP-04, MP-05.

References

 

CM-03 Configuration change control

Control

  1. Determine and document the types of changes to the system that are configuration-controlled
  2. Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses
  3. Document configuration change decisions associated with the system
  4. Implement approved configuration-controlled changes to the system
  5. Retain records of configuration-controlled changes to the system for [Assignment: organization-defined time period]
  6. Monitor and review activities associated with configuration-controlled changes to the system
  7. Coordinate and provide oversight for configuration change control activities through [Assignment: organization-defined configuration change control element] that convenes [Selection (1 or more): [Assignment: organization-defined frequency]; when [Assignment: organization-defined configuration change conditions]]

Discussion

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades and modifications. Configuration change control includes changes to baseline configurations, configuration items of systems, operational procedures, configuration settings for system components, remediate vulnerabilities, and unscheduled or unauthorized changes. Processes for managing configuration changes to systems include configuration control boards or change advisory boards that review and approve proposed changes. For new systems or major upgrades, organizations consider including representatives from the development organizations on the configuration control boards or change advisory boards. Auditing of changes includes activities before and after changes are made to systems and the auditing activities required to implement such changes. See also SA-10.

GC discussion

For changes that impact privacy risk, the appropriate privacy senior official or executive updates PIAs and PIBs.

Related controls and activities

CA-07, CM-02, CM-04, CM-05, CM-06, CM-09, CM-11, IA-03, MA-02, PE-16, PT-06, RA-08, SA-08, SA-10, SC-28, SC-34, SC-37, SI-02, SI-03, SI-04, SI-07, SI-10, SR-11.

Enhancements

  • (01) Configuration change control: Automated documentation, notification, and prohibition of changes
    • Use [Assignment: organization-defined automated mechanisms] to:
      1. document proposed changes to the system
      2. notify [Assignment: organization-defined approval authorities] of proposed changes to the system and request change approval
      3. highlight proposed changes to the system that have not been approved or disapproved within [Assignment: organization-defined time period]
      4. prohibit changes to the system until designated approvals are received
      5. document all changes to the system
      6. notify [Assignment: organization-defined personnel] when approved changes to the system are completed
    • Discussion: None.
    • Related controls and activities: None.
  • (02) Configuration change control: Testing, validation, and documentation of changes
    • Test, validate, and document changes to the system before finalizing the implementation of the changes.
    • Discussion: Changes to systems include modifications to hardware, software, or firmware components and configuration settings defined in CM-06. Organizations ensure that testing does not interfere with system operations that support organizational mission and business functions. Individuals or groups conducting tests understand security and privacy policies and procedures; system security and privacy policies and procedures; and the health, safety, and environmental risks associated with specific facilities or processes. Operational systems may need to be taken offline or replicated to the extent feasible, before testing can be conducted. If systems must be taken offline for testing, the tests are scheduled to occur during planned system outages whenever possible. If the testing cannot be conducted on operational systems, organizations employ compensating controls.
    • Related controls and activities: None.
  • (03) Configuration change control: Automated change implementation
    • Implement changes to the current system baseline and deploy the updated baseline across the installed base using [Assignment: organization-defined automated mechanisms].
    • Discussion: Automated tools can improve the accuracy, consistency, and availability of configuration baseline information. Automation can also provide data aggregation and data correlation capabilities, alerting mechanisms, and dashboards to support risk-based decision-making within the organization.
    • Related controls and activities: None.
  • (04) Configuration change control: Security and privacy representatives
    • Require [Assignment: organization-defined security and privacy representatives] to be members of the [Assignment: organization-defined configuration change control element].
    • Discussion: Information security and privacy representatives include system security officers, senior officials in the department’s security governance, custodians, or appropriate privacy senior officials or executives. Representation by personnel with information security and privacy expertise is important because changes to system configurations can have unintended side effects, some of which may be security- or privacy-relevant. Detecting such changes early in the process can help avoid unintended, negative consequences that could ultimately affect the security and privacy posture of systems. The configuration change control element referred to in the second organization-defined parameter reflects the change control elements defined by organizations in CM-03G.
    • Related controls and activities: None.
  • (05) Configuration change control: Automated security response
    • Implement the following security responses automatically if baseline configurations are changed in an unauthorized manner: [Assignment: organization-defined security responses].
    • Discussion: Automated security responses include halting selected system functions, halting system processing, and issuing alerts or notifications to organizational personnel when there is an unauthorized modification of a configuration item.
    • Related controls and activities: None.
  • (06) Configuration change control: Cryptography management
    • Ensure that cryptographic mechanisms used to provide the following controls are under configuration management: [Assignment: organization-defined controls].
    • Discussion: The controls referenced in the control enhancement refer to security and privacy controls from the control catalogue. Regardless of the cryptographic mechanisms employed, processes and procedures are in place to manage those mechanisms. For example, if system components use certificates for identification and authentication, a process is implemented to address the expiration of those certificates.
    • Related controls and activities: SC-12.
  • (07) Configuration change control: Review system changes
    • Review changes to the system [Assignment: organization-defined frequency] or when [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.
    • Discussion: Indications that warrant a review of changes to the system and the specific circumstances justifying such reviews may be obtained from activities carried out by organizations during the configuration change process or continuous monitoring process. For systems that facilitate the collection or use of personal information, system changes that are substantial to the business process or logic may trigger the requirement for a PIA.
    • Related controls and activities: AU-06, AU-07, CM-03.
  • (08) Configuration change control: Prevent or restrict configuration changes
    • Prevent or restrict changes to the configuration of the system under the following circumstances: [Assignment: organization-defined circumstances].
    • Discussion: System configuration changes can adversely affect critical system security and privacy functionality. Change restrictions can be enforced through automated mechanisms.
    • Related controls and activities: None.

References

 

CM-04 Impact analyses

Control

Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.

Discussion

Organizational personnel with security or privacy responsibilities conduct impact analyses. Individuals conducting impact analyses possess the necessary skills and technical expertise to analyze the changes to systems as well as the security or privacy ramifications. Impact analyses include reviewing security and privacy plans, policies, and procedures to understand control requirements; reviewing system design documentation and operational procedures to understand control implementation and how specific system changes might affect the controls; reviewing the impact of changes on organizational supply chain partners with stakeholders; and determining how potential changes to a system create new risks to the privacy of individuals. Impact analyses also include risk assessments to understand the impact of the changes and determine if additional controls are required. Completion of a PIA assesses compliance for privacy protections using the Fair Information Principles to determine how potential changes to a system may create new risks to the privacy of individuals and the ability of implemented controls to mitigate those risks.

GC discussion

If the system facilitates automated decision-making, it may also be a requirement to complete and release the final results of an algorithmic impact assessment prior to the production of any automated decision system.

Related controls and activities

CA-07, CM-03, CM-08, CM-09, MA-02, RA-03, RA-05, RA-08, SA-05, SA-08, SA-10, SI-02.

Enhancements

  • (01) Impact analyses: Separate test environments
    • Analyze changes to the system in a separate test environment before implementation in an operational environment, looking for security and privacy impacts due to flaws, weaknesses, incompatibility, or intentional malice.
    • Discussion: A separate test environment must be physically or logically separate and distinct from the operational environment. The separation is sufficient to ensure that activities in the test environment do not impact activities in the operational environment and that information in the operational environment is not inadvertently transmitted to the test environment. Separate environments can be achieved by physical or logical means. If physically separate test environments are not implemented, organizations determine the strength of mechanism required when implementing logical separation.
    • Related controls and activities: SA-11, SC-07.
  • (02) Impact analyses: Verification of controls
    • After system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.
    • Discussion: Implementation in this context refers to installing changed code in the operational system that may have an impact on security or privacy controls.
    • Related controls and activities: SA-11, SC-03, SI-06.

References

 

CM-05 Access restrictions for change

Control

Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.

Discussion

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or individuals’ privacy. Therefore, organizations permit only qualified and authorized individuals to access systems for purposes of initiating changes. Access restrictions include physical and logical access controls (see AC-03 and PE-03), software libraries, workflow automation, media libraries, abstract layers (i.e., changes implemented into external interfaces rather than directly into systems), and change windows (i.e., changes occur only during specified times).

Related controls and activities

AC-03, AC-05, AC-06, CM-09, PE-03, SC-28, SC-34, SC-37, SI-02, SI-10.

Enhancements

  • (01) Access restrictions for change: Automated access enforcement and audit records
      1. Enforce access restrictions using [Assignment: organization-defined automated mechanisms]
      2. Automatically generate audit records of the enforcement actions
    • Discussion: Organizations log system accesses associated with applying configuration changes to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes.
    • Related controls and activities: AU-02, AU-06, AU-07, AU-12, CM-06, CM-11, SI-12.
  • (02) Access restrictions for change: Review system changes
    • Withdrawn: Incorporated into CM-03(07).
  • (03) Access restrictions for change: Signed components
    • Withdrawn: Moved to CM-14.
  • (04) Access restrictions for change: Dual authorization
    • Enforce dual authorization for implementing changes to [Assignment: organization-defined system components and system-level information].
    • Discussion: Organizations employ dual authorization to help ensure that any changes to selected system components and information cannot occur unless 2 qualified individuals approve and implement such changes. The 2 individuals possess the skills and expertise to determine if the proposed changes are correct implementations of approved changes. The individuals are also accountable for the changes. Dual authorization may also be known as two-person control. To reduce the risk of collusion, organizations consider rotating dual authorization duties to other individuals. System-level information includes operational procedures.
    • Related controls and activities: AC-02, AC-05, CM-03.
  • (05) Access restrictions for change: Privilege limitation for production and operation
      1. Limit privileges to change system components and system-related information within a production or operational environment
      2. Review and re-evaluate privileges [Assignment: organization-defined frequency]
    • Discussion: In many organizations, systems support multiple mission and business functions. Limiting privileges to change system components with respect to operational systems is necessary because changes to a system component may have far-reaching effects on mission and business processes supported by the system. The relationships between systems and mission/business processes are, in some cases, unknown to developers. System-related information includes operational procedures.
    • Related controls and activities: AC-02.
  • (06) Access restrictions for change: Limit library privileges
    • Limit privileges to change software resident within software libraries.
    • Discussion: Software libraries include privileged programs.
    • Related controls and activities: AC-02.
  • (07) Access restrictions for change: Automatic implementation of security safeguards
    • Withdrawn: Incorporated into SI-07.

References

 

CM-06 Configuration Settings

Control:

  1. Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using [Assignment: organization-defined common secure configurations]
  2. Implement the configuration settings
  3. Identify, document, and approve any deviations from established configuration settings for [Assignment: organization-defined system components] based on [Assignment: organization-defined operational requirements]
  4. Monitor and control changes to the configuration settings in accordance with organizational policies and procedures

Discussion

Configuration settings are the parameters that can be changed in the hardware, software, or firmware components of the system that affect the security and privacy posture or functionality of the system. Information technology products for which configuration settings can be defined include mainframe computers, servers, workstations, operating systems, mobile devices, input/output devices, protocols, and applications. Parameters that impact the security posture of systems include registry settings; account, file, or directory permission settings; and settings for functions, protocols, ports, services, and remote connections. Privacy parameters are parameters impacting the privacy posture of systems, including the parameters required to satisfy other privacy controls. Privacy parameters include settings for access controls, personal information, data accuracy requirements, data manipulation capabilities, data processing preferences, and information handling and retention permissions. Organizations establish organization-wide configuration settings and subsequently derive specific configuration settings for systems. The established settings become part of the configuration baseline for the system.

Common secure configurations (also known as security configuration checklists, lockdown and hardening guides, and security reference guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for information technology products and platforms as well as instructions for configuring those products or platforms to meet operational requirements. Common secure configurations can be developed by a variety of organizations, including information technology product developers, manufacturers, vendors, federal agencies, consortia, academia, industry, and other organizations in the public and private sectors.

Implementation of a common secure configuration may be mandated at the organization level, mission and business process level, system level, or at a higher level, including by a regulatory agency. Common secure configurations include the Baseline security requirements for network security zones (ITSP.80.022), Common Criteria Evaluated Configuration Guides, and the US Department of Defense (DoD) security technical implementation guides (STIGs), which affect the implementation of CM-06 and other controls such as AC-19 and CM-07. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol provide an effective method to uniquely identify, track, and control configuration settings.

Related controls and activities

AC-03, AC-19, AU-02, AU-06, CA-09, CM-02, CM-03, CM-05, CM-07, CM-11, CP-07, CP-09, CP-10, IA-03, IA-05, PL-08, PL-09, RA-05, SA-04, SA-05, SA-08, SA-09, SC-18, SC-28, SC-43, SI-02, SI-04, SI-06.

Enhancements

  • (01) Configuration settings: Automated management, application, and verification
    • Manage, apply, and verify configuration settings for [Assignment: organization-defined system components] using [Assignment: organization-defined automated mechanisms].
    • Discussion: Automated tools (for example, hardening tools, baseline configuration tools) can improve the accuracy, consistency, and availability of configuration settings information. Automation can also provide data aggregation and data correlation capabilities, alerting mechanisms, and dashboards to support risk-based decision-making within the organization.
    • Related controls and activities: CA-07.
  • (02) Configuration settings: Respond to unauthorized changes
    • Take the following actions in response to unauthorized changes to [Assignment: organization-defined configuration settings]: [Assignment: organization-defined actions].
    • Discussion: Responses to unauthorized changes to configuration settings include alerting designated organizational personnel, restoring established configuration settings, or — in extreme cases — halting affected system processing.
    • Related controls and activities: IR-04, IR-06, SI-07.
  • (03) Configuration settings: Unauthorized change detection
    • Withdrawn: Incorporated into SI-07.
  • (04) Configuration settings: Conformance demonstration
    • Withdrawn: Incorporated into CM-04.

References

 

CM-07 Least functionality

Control

  1. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]
  2. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services]

Discussion

Systems provide a wide variety of functions and services. Some of the functions and services routinely provided by default may not be necessary to support essential organizational missions, functions, or operations. Additionally, it is sometimes convenient to provide multiple services from a single system component but doing so increases risk over limiting the services provided by that single component.

Where feasible, organizations limit component functionality to a single function per component. Organizations consider removing unused or unnecessary software and disabling unused or unnecessary physical and logical ports and protocols to prevent unauthorized connection of components, transfer of information, and tunnelling. Organizations employ network scanning tools, intrusion detection and prevention systems, and end-point protection technologies, such as firewalls and host-based intrusion detection systems, to identify and prevent the use of prohibited functions, protocols, ports, and services.

Least functionality can also be achieved as part of the fundamental design and development of the system (see SA-08, SC-02, and SC-03). For the concept of least functionality, consideration should be limiting the volume of personal information to that which is required by the system, reducing the impact in the event of a breach.

Related controls and activities

AC-03, AC-04, CM-02, CM-05, CM-06, CM-11, RA-05, SA-04, SA-05, SA-08, SA-09, SA-15, SC-02, SC-03, SC-07, SC-37, SI-04, SI-400.

Enhancements

  • (01) Least functionality: Periodic review
      1. Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure functions, ports, protocols, software, and services
      2. Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within the system deemed to be unnecessary and/or nonsecure]
    • Discussion: Organizations review functions, ports, protocols, and services provided by systems or system components to determine the functions and services that are candidates for elimination. Such reviews are especially important during transition periods from older technologies to newer technologies (e.g., transition from IPv4 to IPv6). These technology transitions may require implementing the older and newer technologies simultaneously during the transition period and returning to minimum essential functions, ports, protocols, and services at the earliest opportunity. Organizations can either decide the relative security of the function, port, protocol, and/or service or base the security decision on the assessment of other entities. Unsecure protocols include Bluetooth, FTP, and peer-to-peer networking.
    • Related controls and activities: AC-18.
  • (02) Least functionality: Prevent program execution
    • Prevent program execution in accordance with [Selection (1 or more): [Assignment: organization-defined policies, rules of behaviour, and/or access agreements regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].
    • Discussion: Prevention of program execution addresses organizational policies, rules of behaviour, and/or access agreements that restrict software usage and the terms and conditions imposed by the developer or manufacturer, including software licensing and copyrights. Restrictions include prohibiting auto-execute features, restricting roles allowed to approve program execution, permitting, or prohibiting specific software programs, or restricting the number of program instances executed at the same time.
    • Related controls and activities: CM-08, PL-04, PL-09, PM-05, PS-06.
  • (03) Least functionality: Registration compliance
    • Ensure compliance with [Assignment: organization-defined registration requirements for functions, ports, protocols, and services].
    • Discussion: Organizations use the registration process to manage, track, and provide oversight for systems and implemented functions, ports, protocols, and services.
    • Related controls and activities: None.
  • (04) Least functionality: Unauthorized software — Deny-by-exception
      1. Identify [Assignment: organization-defined software programs not authorized to execute on the system]
      2. Employ an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the system
      3. Review and update the list of unauthorized software programs [Assignment: organization-defined frequency]
    • Discussion: Unauthorized software programs can be limited to specific versions or from a specific source. The concept of prohibiting the execution of unauthorized software may also be applied to user actions, system ports and protocols, IP addresses/ranges, websites, and MAC addresses.
    • Related controls and activities: CM-06, CM-08, CM-10, PL-09, PM-05.
  • (05) Least functionality: Authorized software — Allow-by-exception
      1. Identify [Assignment: organization-defined software programs authorized to execute on the system]
      2. Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system
      3. Review and update the list of authorized software programs [Assignment: organization-defined frequency]
    • Discussion: Authorized software programs can be limited to specific versions or from a specific source. To facilitate a comprehensive authorized software process and increase the strength of protection for attacks that bypass application level authorized software, software programs may be decomposed into and monitored at different levels of detail. These levels include applications, application programming interfaces (APIs), application modules, scripts, system processes, system services, kernel functions, registries, drivers, and dynamic link libraries. The concept of permitting the execution of authorized software may also be applied to user actions, system ports and protocols, IP addresses/ranges, websites, and MAC addresses. Organizations consider verifying the integrity of authorized software programs using digital signatures, cryptographic checksums, or hash functions. Verification of authorized software can occur either prior to execution or at system start-up. The identification of authorized URLs for websites is addressed in CA-03(05) and SC-07.
    • Related controls and activities: CM-02, CM-06, CM-08, CM-10, PL-09, PM-05, SA-10, SC-34, SI-07.
  • (06) Least functionality: Confined environments with limited privileges
    • Require that the following user-installed software execute in a confined physical or virtual machine environment with limited privileges: [Assignment: organization-defined user-installed software].
    • Discussion: Organizations identify software that may be of concern regarding its origin or potential for containing malicious code. For this type of software, user installations occur in confined environments of operation to limit or contain damage from malicious code that may be executed.
    • Related controls and activities: CM-11, SC-44.
  • (07) Least functionality: Code execution in protected environments
    • Allow execution of binary or machine-executable code only in confined physical or virtual machine environments and with the explicit approval of [Assignment: organization-defined personnel or roles] when such code is:
      1. obtained from sources with limited or no warranty
      2. without the provision of source code
    • Discussion: Code execution in protected environments applies to all sources of binary or machine-executable code, including commercial software and firmware and open-source software.
    • Related controls and activities: CM-10, SC-44.
  • (08) Least functionality: Binary or machine executable code
      1. Prohibit the use of binary or machine-executable code from sources with limited or no warranty or without the provision of source code
      2. Allow exceptions only for compelling mission or operational requirements and with the approval of the authorizing official
    • Discussion: Binary or machine executable code applies to all sources of binary or machine-executable code, including commercial software and firmware and open-source software. Organizations assess software products without accompanying source code or from sources with limited or no warranty for potential security impacts. The assessments address the fact that software products without the provision of source code may be difficult to review, repair, or extend. In addition, there may be no owners to make such repairs on behalf of organizations. If open-source software is used, the assessments address the fact that there is no warranty, the open-source software could contain backdoors or malware, and there may be no support available.
    • Related controls and activities: SA-05, SA-22.
  • (09) Least functionality: Prohibiting the use of unauthorized hardware
      1. Identify [Assignment: organization-defined hardware components authorized for system use]
      2. Prohibit the use or connection of unauthorized hardware components
      3. Review and update the list of authorized hardware components [Assignment: organization-defined frequency]
    • Discussion: Hardware components provide the foundation for organizational systems and the platform for the execution of authorized software programs. Managing the inventory of hardware components and controlling which hardware components are permitted to be installed or connected to organizational systems is essential to provide adequate security.
    • Related controls and activities: None.

References

 

CM-08 System component inventory

Control

  1. Develop and document an inventory of system components that
    1. accurately reflects the system
    2. includes all components within the system
    3. does not include duplicate accounting of components or components assigned to any other system
    4. is at the level of granularity deemed necessary for tracking and reporting
    5. includes the following information to achieve system component accountability: [Assignment: organization-defined information deemed necessary to achieve effective system component accountability]
  2. Review and update the system component inventory [Assignment: organization-defined frequency]

Discussion

System components are discrete, identifiable IT assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories that include components from all organizational systems. In such situations, organizations ensure that the inventories include system-specific information required for component accountability. The information necessary for effective accountability of system components includes the system name, software owners, software version numbers, hardware inventory specifications, software license information, and for networked components, the machine names and network addresses across all implemented protocols (e.g., IPv4, IPv6). Inventory specifications include date of receipt, cost, model, serial number, manufacturer, supplier information, component type, and physical location.

Preventing duplicate accounting of system components addresses the lack of accountability that occurs when component ownership and system association is unknown, especially in large or complex connected systems. Effective prevention of duplicate accounting of system components necessitates the use of a unique identifier for each component. For software inventory, centrally managed software that is accessed via other systems is addressed as a component of the system on which it is installed and managed. Software installed on multiple organizational systems and managed at the system level is addressed for each individual system and may appear more than once in a centralized component inventory, necessitating a system association for each software instance in the centralized inventory to avoid duplicate accounting of components. Scanning systems implementing multiple network protocols (e.g., IPv4 and IPv6) can result in duplicate components being identified in different address spaces. The implementation of CM-08(07) can help to eliminate duplicate accounting of components.

Related controls and activities

CM-02, CM-07, CM-09, CM-10, CM-11, CM-13, CP-02, CP-09, MA-02, MA-06, PE-20, PL-09, PM-05, SA-04, SA-05, SI-02, SR-04.

Enhancements

  • (01) System component inventory: Updates during installation and removal
    • Update the inventory of system components as part of component installations, removals, and system updates.
    • Discussion: Organizations can improve the accuracy, completeness, and consistency of system component inventories if the inventories are updated as part of component installations or removals or during general system updates. If inventories are not updated at these key times, there is a greater likelihood that the information will not be appropriately captured and documented. System updates include hardware, software, and firmware components.
    • Related controls and activities: PM-16.
  • (02) System component inventory: Automated maintenance
    • Maintain the currency, completeness, accuracy, and availability of the inventory of system components using [Assignment: organization-defined automated mechanisms].
    • Discussion: Organizations maintain system inventories to the extent feasible. For example, virtual machines can be difficult to monitor because such machines are not visible to the network when not in use. In such cases, organizations maintain as up-to-date, complete, and accurate an inventory as is deemed reasonable. Automated maintenance can be achieved by the implementation of CM-02(02) for organizations that combine system component inventory and baseline configuration activities.
    • Related controls and activities: None.
  • (03) System component inventory: Automated unauthorized component detection
      1. Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency]
      2. Take the following actions when unauthorized components are detected: [Selection (1 or more): disable network access by such components; isolate the components; notify [Assignment: organization-defined personnel or roles]]
    • Discussion: Automated unauthorized component detection is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms may also be used to prevent the connection of unauthorized components (see CM-07(09)). Automated mechanisms can be implemented in systems or in separate system components. When acquiring and implementing automated mechanisms, organizations consider whether such mechanisms depend on the ability of the system component to support an agent or supplicant to be detected since some types of components do not have or cannot support agents (e.g., Internet of things (IoT) devices, sensors). Isolation can be achieved, for example, by placing unauthorized system components in separate domains or subnets or quarantining such components. This type of component isolation is commonly referred to as sandboxing.
    • Related controls and activities: AC-19, CA-07, RA-05, SC-03, SC-39, SC-44, SI-03, SI-04, SI-07.
  • (04) System component inventory: Accountability information
    • Include in the system component inventory information, a means for identifying by [Selection (1 or more): name; position; role], individuals responsible and accountable for administering those components.
    • Discussion: Identifying individuals who are responsible and accountable for administering system components ensures that the assigned components are properly administered and that organizations can contact those individuals if some action is required (e.g., when the component is determined to be the source of a breach, needs to be recalled or replaced, or needs to be relocated).
    • Related controls and activities: AC-03.
  • (05) System component inventory: No duplicate accounting of components
    • Withdrawn: Incorporated into CM-08.
  • (06) System component inventory: Assessed configurations and approved deviations
    • Include assessed component configurations and any approved deviations to current deployed configurations in the system component inventory.
    • Discussion: Assessed configurations and approved deviations focus on configuration settings established by organizations for system components, the specific components that have been assessed to determine compliance with the required configuration settings, and any approved deviations from established configuration settings.
    • Related controls and activities: None.
  • (07) System component inventory: Centralized repository
    • Provide a centralized repository for the inventory of system components.
    • Discussion: Organizations may implement centralized system component inventories that include components from all organizational systems. Centralized repositories of component inventories provide opportunities for efficiencies in accounting for organizational hardware, software, and firmware assets. Such repositories may also help organizations rapidly identify the location and responsible individuals of components that have been compromised, breached, or are otherwise in need of mitigation actions. Organizations ensure that the resulting centralized inventories include system-specific information required for proper component accountability.
    • Related controls and activities: None.
  • (08) System component inventory: Automated location tracking
    • Support the tracking of system components by geographic location using [Assignment: organization-defined automated mechanisms].
    • Discussion: The use of automated mechanisms to track the location of system components can increase the accuracy of component inventories. Such capability may help organizations rapidly identify the location and responsible individuals of system components that have been compromised, breached, or are otherwise in need of mitigation actions. The use of tracking mechanisms should be coordinated with appropriate privacy senior officials or executives as there may be implications that affect individual privacy.
    • Related controls and activities: None.
  • (09) System component inventory: Assignment of components to systems
      1. Assign system components to a system
      2. Receive an acknowledgement from [Assignment: organization-defined personnel or roles] of this assignment
    • Discussion: System components that are not assigned to a system may be unmanaged, lack the required protection, and become an organizational vulnerability.
    • Related controls and activities: None.

References

 

CM-09 Configuration management plan

Control

Develop, document, and implement a configuration management plan for the system that

  1. addresses roles, responsibilities, and configuration management processes and procedures
  2. establishes a process for identifying configuration items throughout the system development lifecycle and for managing the configuration of the configuration items
  3. defines the configuration items for the system and places the configuration items under configuration management
  4. is reviewed and approved by [Assignment: organization-defined personnel or roles]
  5. protects the configuration management plan from unauthorized disclosure and modification

Discussion

Configuration management activities occur throughout the system development lifecycle. As such, there are developmental configuration management activities (e.g., the control of code and software libraries) and operational configuration management activities (e.g., control of installed components and how the components are configured). Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual systems. Configuration management plans define processes and procedures for how configuration management is used to support system development lifecycle activities.

Configuration management plans are generated during the development and acquisition stage of the system development lifecycle. The plans describe how to advance changes through change management processes; update configuration settings and baselines; maintain component inventories; control development, test, and operational environments; and develop, release, and update key documents.

Organizations can employ templates to help ensure the consistent and timely development and implementation of configuration management plans. Templates can represent a configuration management plan for the organization with subsets of the plan implemented on a system-by-system basis.

Configuration management approval processes include the designation of key stakeholders responsible for reviewing and approving proposed changes to systems, and personnel who conduct security and privacy impact analyses prior to the implementation of changes to the systems. Configuration items are the system components, such as the hardware, software, firmware, and documentation to be configuration managed. As systems continue through the system development lifecycle, new configuration items may be identified, and some existing configuration items may no longer need to be under configuration control.

Related controls and activities

CM-02, CM-03, CM-04, CM-05, CM-08, PL-02, RA-08, SA-10, SI-12.

Enhancements

  • (01) Configuration management plan: Assignment of responsibility
    • Assign responsibility for developing the configuration management process to organizational personnel that are not directly involved in system development.
    • Discussion: In the absence of dedicated configuration management teams assigned within organizations, system developers may be tasked with developing configuration management processes using personnel who are not directly involved in system development or system integration. This separation of duties ensures that organizations establish and maintain a sufficient degree of independence between the system development and integration processes and configuration management processes to facilitate quality control and more effective oversight.
    • Related controls and activities: None.

References

 

CM-10 Software use restrictions

Control

  1. Use software and associated documentation in accordance with contract agreements and copyright laws
  2. Track the use of software and associated documentation protected by quantity licenses to control copying and distribution
  3. Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work

Discussion

Software license tracking can be accomplished by manual or automated methods, depending on organizational needs. Examples of contract agreements include software license agreements and non-disclosure agreements.

Related controls and activities

AC-17, AU-06, CM-07, CM-08, PM-30, SC-07.

Enhancements

  • (01) Software usage restrictions: Open-source software
    • Establish the following restrictions on the use of open-source software: [Assignment: organization-defined restrictions].
    • Discussion: Open-source software refers to software that is available in source code form. Certain software rights normally reserved for copyright holders are routinely provided under software license agreements that permit individuals to study, change, and improve the software. From a security perspective, the major advantage of open-source software is that it provides organizations with the ability to examine the source code. In some cases, there is an online community associated with the software that inspects, tests, updates, and reports on issues found in software on an ongoing basis. However, remediating vulnerabilities in open-source software may be problematic. There may also be licensing issues associated with open-source software, including the constraints on derivative use of such software.
    • GC discussion: Collections of any personal information facilitated by open-source software is governed by the same restrictions set by the Privacy Act for collection, use and potential disclosure.
    • Related controls and activities: SI-07.

References

 

CM-11 User-installed software

Control

  1. Establish [Assignment: organization-defined policies] governing the installation of software by users
  2. Enforce software installation policies through the following methods: [Assignment: organization-defined methods]
  3. Monitor policy compliance [Assignment: organization-defined frequency]

Discussion

If provided the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved app stores. Prohibited software installations include software with unknown or suspect pedigrees or software that organizations consider potentially malicious. Policies selected for governing user-installed software are organization-developed or provided by some external entity. Policy enforcement methods can include procedural methods and automated methods.

Related controls and activities

AC-03, AU-06, CM-02, CM-03, CM-05, CM-06, CM-07, CM-08, PL-04, SI-04, SI-07.

Enhancements

  • (01) User-installed software: Alerts for unauthorized installations
    • Withdrawn: Incorporated into CM-08(03).
  • (02) User-installed software: Software installation with privileged status
    • Allow user installation of software only with explicit privileged status.
    • Discussion: Privileged status can be obtained, for example, by serving in the role of system administrator.
    • Related controls and activities: AC-05, AC-06.
  • (03) User-installed software: Automated enforcement and monitoring
    • Enforce and monitor compliance with software installation policies using [Assignment: organization-defined automated mechanisms].
    • Discussion: Organizations enforce and monitor compliance with software installation policies using automated mechanisms, which allow for quicker detection and response to unauthorized software installation which can be an indicator of an internal or external hostile attack.
    • Related controls and activities: None.

References

 

CM-12 Information location

Control

  1. Identify and document the location of [Assignment: organization-defined information] and the specific system components on which the information is processed and stored
  2. Identify and document the users who have access to the system and system components where the information is processed and stored
  3. Document changes to the location (i.e., system or system components) where the information is processed and stored

Discussion

Information location addresses the need to understand where information is being processed and stored and reflects data residency requirements. Information location includes identifying where specific information types and information reside in system components and how information is being processed so that information flow can be understood and adequate protection and policy management provided for such information and system components. The location of the information and system components is also a factor in the architecture and design of the system (see SA-04, SA-08, SA-17). There may be information location implications for systems that handle personal information.

GC discussion

The security category of the information is also a factor in determining the controls necessary to protect the information and the system component where the information resides (see TBS Standard on Security Categorization).

Related controls and activities

AC-02, AC-03, AC-04, AC-06, AC-23, CM-08, PM-05, RA-02, SA-04, SA-08, SA-17, SA-400, SC-04, SC-16, SC-28, SI-04, SI-07.

Enhancements

  • (01) Information location: Automated tools to support information location
    • Use automated tools to identify [Assignment: organization-defined information by information type] on [Assignment: organization-defined system components] to ensure controls are in place to protect organizational information and individual privacy.
    • Discussion: The use of automated tools helps to increase the effectiveness and efficiency of the information location capability implemented within the system. Automation also helps organizations manage the data produced during information location activities and share such information across the organization. The output of automated information location tools can be used to guide and inform system architecture and design decisions.
    • Related controls and activities: None.

References

 

CM-13 Data action mapping

Control

Develop and document a map of system data actions.

Discussion

Data actions are system operations, and some data actions involve personal information. The handling of such information encompasses the full information lifecycle, which includes collection, creation, transformation, use, disclosure, retention, and disposition.

A map of system data actions includes discrete data actions, identifying which elements of personal information are in use for the data actions, system components involved in the data actions, information custodians, and the owners or operators of the system components. Understanding what personal information is being handled (e.g., the sensitivity of the personal information), how personal information is being handled (e.g., if the data action is visible to the individual or is handled in another part of the system), and by whom provides a number of contextual factors that are important to assessing the degree of privacy risk associated with the system.

Data maps can be illustrated in different ways, and the level of detail may vary based on the mission and business needs of the organization. The data map may be an overlay of any system design artifact that the organization is using. The development of this map may necessitate coordination between the privacy and security programs regarding the covered data actions and the components that are identified as part of the system. Users whose activities are mapped should be given notice of the activity.

Related controls and activities

AC-03, AC-08, CM-04, CM-12, PM-05, PM-27, PT-02, PT-03, RA-03, RA-08.

Enhancements

None.

References

 

CM-14 Signed components

Control

Prevent the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.

Discussion

Software and firmware components prevented from installation unless signed with recognized and approved certificates include software and firmware version updates, patches, service packs, device drivers, and basic input/output system updates. Organizations can identify applicable software and firmware components by type, by specific items, or a combination of both. Digital signatures and organizational verification of such signatures is a method of code authentication.

Related controls and activities

CM-07, SC-12, SC-13, SI-07.

Enhancements

None.

References

None.

 
Date modified: