CM-02 Baseline Configuration

Configuration Management

Low Moderate High

Description

The organization develops, documents, and maintains a current baseline configuration of the information system.

Supplemental Guidance

This control establishes a baseline configuration for the information system. The baseline configuration provides information about a particular component’s makeup (e.g., the standard software load for a workstation or notebook computer including updated patch information) and the component’s logical placement within the information system architecture. The baseline configuration also provides the organization with a well-defined and documented specification to which the information system is built and deviations, if required, are documented in support of mission needs/objectives. The baseline configuration of the information system is consistent with the Federal Enterprise Architecture. Related security controls: CM-06, CM-08.

Changes from Rev 4

Adds requirement to update baseline configuration document at organizationally-defined frequencies and for organizationally-defined circumstances (in addition to when changes are made) Incorporates withdrawn control CM-02(1)

MITRE ATT&CK Techniques (287)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Reconnaissance 3 Initial Access 8 Execution 28 Persistence 62 Privilege Escalation 44 Defense Evasion 88 Credential Access 39 Discovery 4 Lateral Movement 17 Collection 19 Command & Control 31 Exfiltration 10 Impact 13
Show all 287 techniques grouped by tactic

Persistence

T1037 T1053 T1133 T1137 T1176 T1205 T1505 T1525 T1542 T1543 T1546 T1554 T1556 T1574 T1653 T1037.002 T1037.003 T1037.004 T1037.005 T1053.002 T1053.003 T1053.005 T1098.004 T1137.001 T1137.002 T1137.003 T1137.004 T1137.005 T1137.006 T1505.001 T1505.002 T1505.003 T1505.004 T1505.005 T1542.003 T1542.004 T1542.005 T1543.001 T1543.002 T1543.003 T1543.004 T1546.002 T1546.003 T1546.004 T1546.006 T1546.010 T1546.013 T1546.014 T1547.003 T1547.007 T1547.008 T1547.013 T1556.004 T1556.008 T1574.001 T1574.004 T1574.005 T1574.007 T1574.008 T1574.009 T1574.010 T1574.013

Privilege Escalation

Defense Evasion

T1027 T1036 T1070 T1127 T1205 T1211 T1216 T1218 T1220 T1221 T1484 T1542 T1548 T1553 T1556 T1562 T1574 T1578 T1599 T1601 T1612 T1622 T1647 T1036.001 T1036.003 T1036.005 T1036.007 T1070.001 T1070.002 T1070.003 T1070.007 T1070.008 T1070.009 T1127.001 T1127.002 T1134.005 T1216.001 T1216.002 T1218.001 T1218.002 T1218.003 T1218.004 T1218.005 T1218.007 T1218.008 T1218.009 T1218.012 T1218.013 T1218.014 T1218.015 T1542.003 T1542.004 T1542.005 T1548.002 T1548.003 T1548.004 T1548.006 T1550.001 T1550.003 T1553.001 T1553.003 T1553.005 T1553.006 T1556.004 T1556.008 T1562.001 T1562.002 T1562.003 T1562.004 T1562.006 T1562.010 T1564.006 T1564.007 T1564.009 T1574.001 T1574.004 T1574.005 T1574.007 T1574.008 T1574.009 T1574.010 T1574.013 T1578.001 T1578.002 T1578.003 T1599.001 T1601.001 T1601.002

Credential Access

Command & Control

Compliance Mappings

ISO 27001:2022

A.8.9

ISO 27002:2022

5.378.318.9

COBIT 2019

BAI10

CIS Controls v8

CIS 12CIS 16.7CIS 4CIS 4.1

NIST CSF 2.0

PR.PS-01

SOC 2 TSC

CC6.1-POF7CC6.7-POF1CC7.1CC7.1-POF1CC8.1

PCI DSS v4.0.1

1.21.2.12.12.2

CSA CCM v4

AIS-06CCC-06CCC-07IVS-04IVS-05UEM-03UEM-05UEM-07

CSA AICM v1

AIS-06CCC-06CCC-07I&S-04I&S-05UEM-03UEM-05UEM-07

FINOS CCC

CCC-C14

ISO 42001:2023

A.4.2A.6.2.3

IEC 62443

3-3 SR 7.6

NIS2 Directive

Art. 21(2)(g)

MAS TRM

11

BSI IT-Grundschutz

NET.1.2NET.3.1SYS.1.1SYS.2.1

ANSSI

Hygiene.18Hygiene.5SecNumCloud.13.1

FINMA Circular 2023/1

IV.A(28)IV.A(29)IV.A(30)IV.A(31)

OSFI B-13

B-13.2.2

EU GDPR

Art.25(1)Art.32(1)(b)

EU DORA

Art.7(1)Art.9(1)

BIO2

5.378.318.9

RBI CSF

Annex1.5

FISC Security Guidelines

FISC.O13FISC.O3FISC.T14FISC.T7

HKMA TM-E-1

TME1.4.1TME1.4.3

MLPS 2.0

8.1.10.48.1.10.68.1.9.5

DNB Good Practice

DNB.10.3DNB.10.5DNB.13.1DNB.13.2DNB.3.2

EU CRA

CRA.I.2bCRA.Info.3

SWIFT CSCF

SWIFT.2.3

SAMA CSF

3.33.53.84.3

NCA ECC

2-35-1

UAE IA

T7

CBB TM

TM-5

Qatar NIA

OSSD

CBUAE

CR-7

CBE CSF

CTO-12CTO-7

SA JS2

JS2-7.2

CBN CSF

Part3.3

BoG CISD

CISD-VI

POPIA

s19

BoM CTRM

3.13.2

IOSCO Cyber Resilience

ID-4

BCBS 239

Principle 2

CPMI-IOSCO PFMI

CG.PRPFMI.P17

FFIEC IS

II.C.10II.C.2

NYDFS 500

500.8

ECB CROE

CROE.2.3.4

EBA ICT Guidelines

3.4.43.5(a)

SEBI CSCRF

PR.IP

BOT Cyber Resilience

Ch2.1

CMMC 2.0

CM

NERC CIP

CIP-010-4

10 CFR 73.54

RG5.71-B-CM

IEEE 1686-2022

5.4

FERC CIP Orders

Order 887

DOE C2M2 v2.1

ASSET

API 1164

Sec 7

AWIA

AWWA Sec 2

IAEA NSS 17-T

Sec 5.4

PCI PTS v6

K

FIPS 140-3

FIPS 140-3 §7.6

PCI HSM

8

ISAE 3402

Clause 4Clause 9

Solvency II

DR.266EIOPA-ICT-4.8

Lloyd's Minimum Standards

MS8.4

NAIC Insurance Data Security

4-config4B

PRA SS1/23

P-IT.3P3.3

FCA SYSC 13

SYSC 13.7.1SYSC 13.7.2

HITRUST CSF v11

09.a

FDA 21 CFR Part 11

§11.10(f)

FDA Cybersecurity Guidance

PU-2SA-3

ISO 27799

12.1

NHS DSPT

NDG-8.3

OWASP MASVS v2.1

MASVS-CODE-1MASVS-CODE-2

MiCA

Art.62(5)

Basel SCO60

SCO60.14SCO60.51SCO60.65

BSSC Standards

NOS-03GSP-14

SEC Custody (Digital Assets)

SEC-CD-08

ISO 17799 (legacy)

7.1.115.1.2

COBIT 4.1 (legacy)

PO1.6PO2.1DS9.1