CM-01 Configuration Management Policy And Procedures

Configuration Management

Low Moderate High Privacy

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.

Supplemental Guidance

The configuration management policy and procedures are consistent with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The configuration management policy can be included as part of the general information security policy for the organization. Configuration management procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publication 800-12 provides guidance on security policies and procedures.

Changes from Rev 4

Title changed from 'Configuration Management Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level configuration management policies Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines New parameter requires the designation of a specific official to manage the development, documentation, and dissemination of the configuration management policy and procedure New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Discussion amplifies the need for configuration management policy and procedures to support risk management, and to help provide security and privacy assurance

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.5.1A.5.37A.8.9

ISO 27002:2022

5.15.37

COBIT 2019

BAI10

CIS Controls v8

CIS 4.1

NIST CSF 2.0

PR.PS-01

SOC 2 TSC

CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC5.3CC5.3-POF1CC5.3-POF6CC7.1CC7.1-POF1CC7.2-POF1P1.1-POF5

PCI DSS v4.0.1

1.112.12.1

CSA CCM v4

CCC-01IVS-01UEM-01

CSA AICM v1

CCC-01I&S-01MDS-01UEM-01

ISO 42001:2023

A.4.2

ANSSI

Hygiene.2Hygiene.5SecNumCloud.13.1SecNumCloud.6.1

FINMA Circular 2023/1

IV.A(23)IV.A(28)IV.A(36)

OSFI B-13

B-13.2.2B-13.2.3

EU GDPR

Art.25(1)Art.32(1)(b)Rec.78

EU DORA

Art.7(1)Art.9(1)

BIO2

5.15.37

RBI CSF

Annex1.5ITGRCA.13

FISC Security Guidelines

FISC.O3

LGPD + BCB 4893

BCB.Art.2LGPD.Art.46

HKMA TM-E-1

TME1.2.5TME1.4.1

DNB Good Practice

DNB.1.2DNB.10.1DNB.13.1

SAMA CSF

1.2

NCA ECC

1-3

UAE IA

T3T7

CBB TM

TM-5

Qatar NIA

OS

CBUAE

CR-7

CBE CSF

CTO-12

SA JS2

JS2-7.2

CBN CSF

Part3.3

BoG CISD

CISD-VI

POPIA

s19

BoM CTRM

3.1

IOSCO Cyber Resilience

GOV-1

BCBS 239

Principle 2

CPMI-IOSCO PFMI

PFMI.P17

FFIEC IS

II.C.1II.C.10

NYDFS 500

500.3

HIPAA Security Rule

§164.316(a)§164.316(b)(1)

ECB CROE

CROE.2.3.4

EBA ICT Guidelines

3.4.13.6.3

SEBI CSCRF

PR.IP

BOT Cyber Resilience

Ch2.1

CMMC 2.0

CM

ISAE 3402

Clause 4

Solvency II

Art.41(3)DR.266

Lloyd's Minimum Standards

MS8.2

NAIC Insurance Data Security

4-config

PRA SS1/23

P3.1

FCA SYSC 13

SYSC 13.7.1

HITRUST CSF v11

04.a09.a

ISO 27799

12.15.1

MiCA

Art.62(1)Art.62(7)

Basel SCO60

SCO60.51SCO60.65

BSSC Standards

GSP-14

ISO 17799 (legacy)

12.4.112.5.115.1.1

COBIT 4.1 (legacy)

PO2.1AI6.1DS9.1PC5