Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
CM-3 | Configuration Change Control | MODERATE | P1 | Configuration Management |
Instructions |
---|
The organization: CM-3a. Determines the types of changes to the information system that are configuration-controlled; CM-3b. Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses; CM-3c. Documents configuration change decisions associated with the information system; CM-3d. Implements approved configuration-controlled changes to the information system; CM-3e. Retains records of configuration-controlled changes to the information system for Assignment: organization-defined time period; CM-3f. Audits and reviews activities associated with configuration-controlled changes to the information system; and CM-3g. Coordinates and provides oversight for configuration change control activities through Assignment: organization-defined configuration change control element (e.g., committee, board) that convenes Selection (one or more): Assignment: organization-defined frequency; Assignment: organization-defined configuration change conditions. |
Guidance |
---|
Configuration change controls for organizational information systems involve the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled/unauthorized changes, and changes to remediate vulnerabilities. Typical processes for managing configuration changes to information systems include, for example, Configuration Control Boards that approve proposed changes to systems. For new development information systems or systems undergoing major upgrades, organizations consider including representatives from development organizations on the Configuration Control Boards. Auditing of changes includes activities before and after changes are made to organizational information systems and the auditing activities required to implement such changes. |
Enhancements | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
The organization employs automated mechanisms to: CM-3 (1)(a)Document proposed changes to the information system; CM-3 (1)(b)Notify Assignment: organized-defined approval authorities of proposed changes to the information system and request change approval; CM-3 (1)(c)Highlight proposed changes to the information system that have not been approved or disapproved by Assignment: organization-defined time period; CM-3 (1)(d)Prohibit changes to the information system until designated approvals are received; CM-3 (1)(e)Document all changes to the information system; and CM-3 (1)(f)Notify Assignment: organization-defined personnel when approved changes to the information system are completed.
The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system.
The organization employs automated mechanisms to implement changes to the current information system baseline and deploys the updated baseline across the installed base.
The organization requires an information security representative to be a member of the Assignment: organization-defined configuration change control element.
The information system implements Assignment: organization-defined security responses automatically if baseline configurations are changed in an unauthorized manner.
The organization ensures that cryptographic mechanisms used to provide Assignment: organization-defined security safeguards are under configuration management. |