CM-08 Information System Component Inventory

Configuration Management

Low Moderate High

Description

The organization develops, documents, and maintains a current inventory of the components of the information system and relevant ownership information.

Supplemental Guidance

The organization determines the appropriate level of granularity for the information system components included in the inventory that are subject to management control (i.e., tracking, and reporting). The inventory of information system components includes any information determined to be necessary by the organization to achieve effective property accountability (e.g., manufacturer, model number, serial number, software license information, system/component owner). The component inventory is consistent with the accreditation boundary of the information system. Related security controls: CM-02, CM-06.

Changes from Rev 4

Adds 'Does not include duplicate accounting of components or components assigned to any other system' Discussion of accountability expanded Incorporates withdrawn control CM-08(5)

MITRE ATT&CK Techniques (101)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Reconnaissance 1 Initial Access 6 Execution 12 Persistence 26 Privilege Escalation 17 Defense Evasion 37 Credential Access 6 Discovery 2 Lateral Movement 11 Collection 13 Command & Control 1 Exfiltration 4 Impact 4
Show all 101 techniques grouped by tactic

Defense Evasion

Compliance Mappings

ISO 27001:2022

A.5.9A.8.9

ISO 27002:2022

5.375.98.18.9

COBIT 2019

BAI09BAI10

CIS Controls v8

CIS 1CIS 1.1CIS 1.2CIS 1.3CIS 1.5CIS 16.4CIS 2CIS 2.1CIS 2.4CIS 3.2

NIST CSF 2.0

ID.AM-01ID.AM-02ID.AM-07ID.AM-08PR.PS-01PR.PS-03

SOC 2 TSC

CC6.1-POF1

PCI DSS v4.0.1

11.212.5

CSA CCM v4

CEK-21DCS-05DCS-06DCS-08DSP-03STA-07UEM-04UEM-12

CSA AICM v1

CEK-21DCS-05DCS-06DCS-08DSP-03MDS-02STA-07STA-15UEM-04UEM-12

FINOS CCC

CCC-C06

ISO 42001:2023

A.4.2A.4.4

NIS2 Directive

Art. 21(2)(i)

PRA Operational Resilience

SS1/21-5.2SS2/21-13.1

APRA CPS 234

Para 21

ASD Essential Eight

E8-2 ML3E8-6 ML3

ANSSI

Hygiene.5Hygiene.8SecNumCloud.9.1

FINMA Circular 2023/1

IV.A(28)IV.A(29)IV.A(30)IV.B.c(54)IV.B.c(55)

OSFI B-13

B-13.2.1B-13.3.1

EU GDPR

Art.30(1)Art.35(7)(a)

EU DORA

Art.28(4)Art.8(1)Art.8(4)

BIO2

5.375.98.18.9

RBI CSF

Annex1.1ITGRCA.9

FISC Security Guidelines

FISC.O13FISC.O9FISC.T7

LGPD + BCB 4893

BCB.Art.20

MLPS 2.0

8.1.10.18.1.10.68.28.3

DNB Good Practice

DNB.13.1DNB.13.2DNB.19.3DNB.6.1

EU CRA

CRA.II.1CRA.Info.3

SWIFT CSCF

SWIFT.2.7

SAMA CSF

2.1

NCA ECC

2-12-6

UAE IA

T4T7

Qatar NIA

AMOS

CBUAE

CR-7

CBE CSF

CRM-2

SA JS2

JS2-6.1JS2-7.2

CBN CSF

Part3.1

BoG CISD

CISD-V

POPIA

s17

BoM CTRM

2.13.23.7

IOSCO Cyber Resilience

ID-1ID-2ID-4

BCBS 239

Principle 2Principle 4

CPMI-IOSCO PFMI

CG.IDPFMI.P17

FFIEC IS

II.C.11II.C.13(e)II.C.5

NYDFS 500

500.13

HIPAA Security Rule

§164.310(d)(2)(iii)

ECB CROE

CROE.2.2.2

EBA ICT Guidelines

3.3.23.4.43.5(a)3.5(b)

SEBI CSCRF

ID.AM

BOT Cyber Resilience

Ch2.1

CMMC 2.0

CM

NERC CIP

CIP-010-4

10 CFR 73.54

RG5.71-B-CM

IEEE 1686-2022

5.4

DOE C2M2 v2.1

ASSET

AWIA

AWWA Sec 2

PCI PTS v6

K

CBEST

CBEST.3

PCI HSM

2

ISAE 3402

Clause 9

Solvency II

DR.266-DataSecEIOPA-ICT-4.3

Lloyd's Minimum Standards

MS1.1MS8.4MS9.3

NAIC Insurance Data Security

34-asset

PRA SS1/23

P-IT.3P1.1P1.3P5.5

FCA SYSC 13

SYSC 13.7.1SYSC 13.7.2

HITRUST CSF v11

05.c07.a10.e

FDA 21 CFR Part 11

§11.10(h)

FDA Cybersecurity Guidance

524B-1SBOM-1SBOM-2SBOM-3ST-4

ISO 27799

11.28.1H.3

NHS DSPT

NDG-5.3NDG-8.1NDG-8.3NDG-9.7

OWASP MASVS v2.1

MASVS-CODE-3

CCSS v9.0

1.02.31.04.5

MiCA

Art.40(1)Art.63(2)Art.82(1)

Basel SCO60

SCO60.14SCO60.51SCO60.65

BSSC Standards

NOS-03GSP-14

SEC Custody (Digital Assets)

SEC-CD-04SEC-CD-09SEC-CD-18

ISO 17799 (legacy)

7.1.115.1.2

COBIT 4.1 (legacy)

None.