Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
CM-8 | Information System Component Inventory | LOW | P1 | Configuration Management |
Instructions |
---|
The organization: CM-8a. Develops and documents an inventory of information system components that: CM-8a.1. Accurately reflects the current information system; CM-8a.2. Includes all components within the authorization boundary of the information system; CM-8a.3. Is at the level of granularity deemed necessary for tracking and reporting; and CM-8a.4. Includes Assignment: organization-defined information deemed necessary to achieve effective information system component accountability; and CM-8b. Reviews and updates the information system component inventory Assignment: organization-defined frequency. |
Guidance |
---|
Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location. |
Enhancements | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.
The organization employs automated mechanisms to help maintain an up-to-date, complete, accurate, and readily available inventory of information system components.
The organization: CM-8 (3)(a)Employs automated mechanisms Assignment: organization-defined frequency to detect the presence of unauthorized hardware, software, and firmware components within the information system; and CM-8 (3)(b)Takes the following actions when unauthorized components are detected: Selection (one or more): disables network access by such components; isolates the components; notifies Assignment: organization-defined personnel or roles.
The organization includes in the information system component inventory information, a means for identifying by Selection (one or more): name; position; role, individuals responsible/accountable for administering those components.
The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories.
The organization includes assessed component configurations and any approved deviations to current deployed configurations in the information system component inventory.
The organization provides a centralized repository for the inventory of information system components.
The organization employs automated mechanisms to support tracking of information system components by geographic location.
The organization: CM-8 (9)(a)Assigns Assignment: organization-defined acquired information system components to an information system; and CM-8 (9)(b)Receives an acknowledgement from the information system owner of this assignment. |