CM-03 Configuration Change Control

Configuration Management

Low Moderate High

Description

The organization authorizes, documents, and controls changes to the information system.\n

Supplemental Guidance

The organization manages configuration changes to the information system using an organizationally approved process (e.g., a chartered Configuration Control Board). Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to the information system, including upgrades and modifications. Configuration change control includes changes to the configuration settings for information technology products (e.g., operating systems, firewalls, routers). The organization includes emergency changes in the configuration change control process, including changes resulting from the remediation of flaws. The approvals to implement a change to the information system include successful results from the security analysis of the change. The organization audits activities associated with configuration changes to the information system. Related security controls: CM-4, CM-6, SI-2.\n

Enhancements

(1) The organization employs automated mechanisms to: (i) document proposed changes to the information system; (ii) notify appropriate approval authorities; (iii) highlight approvals that have not been received in a timely manner; (iv) inhibit change until necessary approvals are received; and (v) document completed changes to the information system.\n

Compliance Mappings

ISO 27001:2022

6.3

ISO 27002:2022

8.198.32

NIST CSF 2.0

ID.RA-07

SOC 2 TSC

CC2.2-POF13CC3.4CC3.4-POF4CC6.8-POF3CC8.1CC8.1-POF1CC8.1-POF10CC8.1-POF11CC8.1-POF13CC8.1-POF14CC8.1-POF16CC8.1-POF2CC8.1-POF3CC8.1-POF4CC8.1-POF5CC8.1-POF6CC8.1-POF7CC8.1-POF8CC8.1-POF9

ISO 17799 (legacy)

10.1.210.2.312.4.112.5.112.5.212.5.3

COBIT 4.1 (legacy)

AI6.1AI6.3DS9.2