CM-05 Access Restrictions For Change

Configuration Management

Low Moderate High

Description

The organization: (i) approves individual access privileges and enforces physical and logical access restrictions associated with changes to the information system; and (ii) generates, retains, and reviews records reflecting all such changes.

Supplemental Guidance

Planned or unplanned changes to the hardware, software, and/or firmware components of the information system can have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals obtain access to information system components for purposes of initiating changes, including upgrades, and modifications.

Enhancements

(1) The organization employs automated mechanisms to enforce access restrictions and support auditing of the enforcement actions.

MITRE ATT&CK Techniques (162)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Initial Access 8 Execution 18 Persistence 59 Privilege Escalation 50 Defense Evasion 66 Credential Access 25 Discovery 1 Lateral Movement 16 Collection 7 Exfiltration 2 Impact 2
Show all 162 techniques grouped by tactic

Persistence

T1053 T1078 T1098 T1136 T1176 T1197 T1505 T1525 T1542 T1543 T1554 T1556 T1574 T1053.002 T1053.003 T1053.005 T1053.006 T1053.007 T1078.002 T1078.003 T1078.004 T1098.001 T1098.002 T1098.003 T1098.004 T1098.005 T1098.007 T1136.001 T1136.002 T1136.003 T1137.002 T1505.002 T1542.001 T1542.003 T1542.004 T1542.005 T1543.001 T1543.002 T1543.003 T1543.004 T1546.003 T1546.016 T1547.003 T1547.004 T1547.006 T1547.007 T1547.009 T1547.012 T1547.013 T1556.001 T1556.003 T1556.004 T1556.008 T1556.009 T1574.005 T1574.010 T1574.011 T1574.012 T1574.014

Privilege Escalation

T1053 T1055 T1078 T1098 T1134 T1484 T1543 T1548 T1574 T1611 T1053.002 T1053.003 T1053.005 T1053.006 T1053.007 T1055.008 T1078.002 T1078.003 T1078.004 T1098.001 T1098.002 T1098.003 T1098.004 T1098.005 T1098.007 T1134.001 T1134.002 T1134.003 T1543.001 T1543.002 T1543.003 T1543.004 T1546.003 T1546.016 T1547.003 T1547.004 T1547.006 T1547.007 T1547.009 T1547.012 T1547.013 T1548.002 T1548.003 T1548.005 T1548.006 T1574.005 T1574.010 T1574.011 T1574.012 T1574.014

Defense Evasion

T1055 T1078 T1134 T1197 T1218 T1222 T1484 T1542 T1548 T1550 T1553 T1556 T1562 T1574 T1578 T1599 T1601 T1647 T1055.008 T1078.002 T1078.003 T1078.004 T1134.001 T1134.002 T1134.003 T1218.007 T1218.015 T1222.001 T1222.002 T1542.001 T1542.003 T1542.004 T1542.005 T1548.002 T1548.003 T1548.005 T1548.006 T1550.002 T1550.003 T1553.006 T1556.001 T1556.003 T1556.004 T1556.008 T1556.009 T1562.001 T1562.002 T1562.004 T1562.006 T1562.007 T1562.008 T1562.009 T1562.011 T1562.012 T1564.008 T1574.005 T1574.010 T1574.011 T1574.012 T1574.014 T1578.001 T1578.002 T1578.003 T1599.001 T1601.001 T1601.002

Credential Access

Compliance Mappings

ISO 27001:2022

A.8.19A.8.32A.8.4A.8.9

ISO 27002:2022

5.378.198.328.48.9

COBIT 2019

BAI06BAI10

CIS Controls v8

CIS 12.3CIS 4.6

PCI DSS v4.0.1

6.5

CSA CCM v4

CCC-03CCC-04

CSA AICM v1

CCC-03CCC-04IAM-19MDS-04MDS-07

FINOS CCC

CCC-C07

ISO 42001:2023

A.6.2.5

BSI IT-Grundschutz

OPS.1.1.2

ANSSI

Hygiene.15Hygiene.16Hygiene.17Hygiene.34SecNumCloud.13.2

FINMA Circular 2023/1

IV.A(36)IV.A(37)IV.B.d(59)

OSFI B-13

B-13.2.3B-13.3.2

EU GDPR

Art.32(1)(b)

EU DORA

Art.9(4)(c)Art.9(4)(e)

BIO2

5.378.198.328.48.9

RBI CSF

Annex1.7ITGRCA.13

FISC Security Guidelines

FISC.O3

HKMA TM-E-1

TME1.3.3TME1.4.1TME1.4.2

MLPS 2.0

8.1.10.88.1.5.1

DNB Good Practice

DNB.10.1DNB.10.5DNB.7.1

SWIFT CSCF

SWIFT.6.2

SAMA CSF

3.5

NCA ECC

2-3

UAE IA

T10T7

CBB TM

TM-5

Qatar NIA

OSSD

CBUAE

CR-7

CBE CSF

CTO-12

SA JS2

JS2-7.2

CBN CSF

Part3.3

BoG CISD

CISD-VI

BoM CTRM

3.6

IOSCO Cyber Resilience

PROT-6

CPMI-IOSCO PFMI

CG.PR

FFIEC IS

II.C.10II.C.7(c)

ECB CROE

CROE.2.3.4

EBA ICT Guidelines

3.4.43.6.3

SEBI CSCRF

PR.IP

BOT Cyber Resilience

Ch2.1

CMMC 2.0

CM

10 CFR 73.54

RG5.71-B-CM

IEEE 1686-2022

5.4

DOE C2M2 v2.1

ASSET

PCI PTS v6

B

FIPS 140-3

FIPS 140-3 §7.11

PCI HSM

4

Common Criteria

CC Part 2 — FMT

ISAE 3402

Clause 4

Solvency II

EIOPA-ICT-4.11EIOPA-ICT-4.8

Lloyd's Minimum Standards

MS5.1MS8.4

NAIC Insurance Data Security

4-config

PRA SS1/23

P3.3P3.4

FCA SYSC 13

SYSC 13.6.2SYSC 13.7.4

HITRUST CSF v11

09.a

FDA 21 CFR Part 11

§11.10(k)

FDA Cybersecurity Guidance

SA-3

NHS DSPT

NDG-4.4

CCSS v9.0

1.01.3

Basel SCO60

SCO60.52SCO60.66

BSSC Standards

TIS-08GSP-14

SEC Custody (Digital Assets)

SEC-CD-05

ISO 17799 (legacy)

11.6.1

COBIT 4.1 (legacy)

None.