CM-03 Configuration Change Control

Configuration Management

Low Moderate High

Description

The organization authorizes, documents, and controls changes to the information system.

Supplemental Guidance

The organization manages configuration changes to the information system using an organizationally approved process (e.g., a chartered Configuration Control Board). Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to the information system, including upgrades and modifications. Configuration change control includes changes to the configuration settings for information technology products (e.g., operating systems, firewalls, routers). The organization includes emergency changes in the configuration change control process, including changes resulting from the remediation of flaws. The approvals to implement a change to the information system include successful results from the security analysis of the change. The organization audits activities associated with configuration changes to the information system. Related security controls: CM-04, CM-06, SI-02.

Enhancements

(1) The organization employs automated mechanisms to: (i) document proposed changes to the information system; (ii) notify appropriate approval authorities; (iii) highlight approvals that have not been received in a timely manner; (iv) inhibit change until necessary approvals are received; and (v) document completed changes to the information system.

MITRE ATT&CK Techniques (35)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Initial Access 2 Execution 1 Persistence 13 Privilege Escalation 6 Defense Evasion 18 Credential Access 2 Lateral Movement 1 Collection 4 Impact 1
Show all 35 techniques grouped by tactic

Lateral Movement

Compliance Mappings

ISO 27001:2022

6.3A.8.32A.8.9

ISO 27002:2022

5.378.328.9

COBIT 2019

BAI05BAI06BAI07BAI10

CIS Controls v8

CIS 16.7CIS 4

NIST CSF 2.0

DE.CM-09ID.RA-07PR.PS-01

SOC 2 TSC

CC3.4CC8.1CC8.1-POF1

PCI DSS v4.0.1

1.2.811.66.5

CSA CCM v4

AIS-06CCC-01CCC-02CCC-03CCC-04CCC-05CCC-07CCC-08CCC-09CEK-05IVS-07UEM-05

CSA AICM v1

AIS-06AIS-09AIS-11CCC-01CCC-02CCC-03CCC-05CCC-07CCC-09CEK-05I&S-07MDS-04MDS-06MDS-11UEM-05

FINOS CCC

CCC-C07

ISO 42001:2023

A.6.2.5

PRA Operational Resilience

SS1/21-11.1

MAS TRM

7

BSI IT-Grundschutz

OPS.1.1.2OPS.1.1.3

ANSSI

Hygiene.34Hygiene.36SecNumCloud.13.2

FINMA Circular 2023/1

IV.A(36)IV.A(37)IV.A(38)IV.A(39)IV.A(40)

OSFI B-13

B-13.2.3

EU GDPR

Art.32(1)(b)Art.32(1)(d)

EU DORA

Art.9(4)(e)

BIO2

5.378.328.9

RBI CSF

Annex1.7ITGRCA.13

FISC Security Guidelines

FISC.O12FISC.O3

HKMA TM-E-1

TME1.3.3TME1.4.1TME1.4.2TME1.4.3

MLPS 2.0

8.1.10.48.1.10.68.1.10.88.1.5.1

DNB Good Practice

DNB.10.1DNB.10.2DNB.10.5DNB.13.2

EU CRA

CRA.I.2cCRA.II.2CRA.II.7CRA.Info.8b

SWIFT CSCF

SWIFT.6.2

SAMA CSF

3.33.5

NCA ECC

2-3

UAE IA

T10T7

CBB TM

TM-11TM-5

Qatar NIA

OSSD

CBUAE

CR-7

CBE CSF

CTO-12CTO-7CTO-9

SA JS2

JS2-7.2JS2-8.5

CBN CSF

Part3.3

BoG CISD

CISD-VI

POPIA

s19

BoM CTRM

3.6

IOSCO Cyber Resilience

PROT-6

BCBS 239

Principle 6

CPMI-IOSCO PFMI

CG.PRPFMI.P17

FFIEC IS

II.C.10

NYDFS 500

500.8

HIPAA Security Rule

§164.316(b)(2)(iii)

ECB CROE

CROE.2.3.4

EBA ICT Guidelines

3.4.43.5(b)3.6.3

SEBI CSCRF

PR.IP

BOT Cyber Resilience

Ch10.1Ch2.1

CMMC 2.0

CM

NERC CIP

CIP-010-4

10 CFR 73.54

RG5.71-B-CM

TSA Pipeline SD

SD-2 Sec D

IEEE 1686-2022

5.4

DOE C2M2 v2.1

ASSET

API 1164

Sec 7

IAEA NSS 17-T

Sec 5.4

PCI PTS v6

BFK

FIPS 140-3

FIPS 140-3 §7.11

PCI HSM

4589

ISAE 3402

Clause 4

Solvency II

EIOPA-ICT-4.11EIOPA-ICT-4.8

Lloyd's Minimum Standards

MS5.1MS8.4

NAIC Insurance Data Security

4-config4E

PRA SS1/23

P3.3P3.4P4.4P5.5

FCA SYSC 13

SYSC 13.7.1SYSC 13.7.4SYSC 13.8.4

HITRUST CSF v11

09.a10.d

FDA 21 CFR Part 11

§11.10(k)

FDA Cybersecurity Guidance

PU-1PU-2SA-3

ISO 27799

12.5

NHS DSPT

NDG-8.2

OWASP MASVS v2.1

MASVS-CODE-2

CCSS v9.0

1.01.31.02.6

Basel SCO60

SCO60.52

BSSC Standards

NOS-10TIS-08KMS-07GSP-14

SEC Custody (Digital Assets)

SEC-CD-07

ISO 17799 (legacy)

10.1.210.2.312.4.112.5.112.5.212.5.3

COBIT 4.1 (legacy)

AI6.1AI6.3DS9.2