This file is generated by a script. To modify, update source file ./cm_low_impact_pri1.yaml.
Why: How we configure our systems oftentimes determines how secure the system will be. Ensuring that we have a well-constructed, properly disseminated configuration management policy will help ensure that are systems are built and maintained securely.
How:
- Define roles in addition to ISSO or ISSM that the configuration management policy is to be disseminated to. (State if there are no additional roles)
- Define roles in addition to ISSO or ISSM that the configuration management procedures are to be disseminated to. (State if there are no additional roles)
- Ensure that the configuration management policy and procedures are disseminated
- Define frequency at which to review and update the configuration management policy and procedures (Annually).
- Maintain audit trail of reviews and updates.
Acceptance Criteria / Evidence:
- List of personnel to whom configuration management policy and procedures are to be disseminated
- Access control policy
- Access control policy version update page
- Access control policy audit trail of reviews and updates
Links:
Labels:
- CM
- CM-1
- security
- configuration
As the CISO, I want to ensure that our IT system configuration settings are the most restrictive possible that meets our functionality requirements.
Why: Establishing and maintaining a standard set of locked-down configurations is the most effective way to avoid security breaches. Documenting the configuration settings is essential for personnel changes and can help us spot overlooked issues. Sharing the documentation further helps us catch security holes.
How:
- Develop and formally review a baseline configuration that can serve as a basis for future builds (CM-2).
- Establish and document the configuration used for all products used by the IT system. This configuration should provide only essential capabilities, and should restrict access to unused functions, ports and protocols (CM-7).
- Identify and document deviations from the established configuration settings.
- Monitor and control changes to the configuration settings.
Acceptance Criteria / Evidence:
- Baseline configuration
- Configuration documentation for all products used by the IT system, including:
- Standard software packages installed on workstations, notebooks, mobile devices, and servers
- Current version numbers and patch information for the OS and applications
- Configuration settings/parameters
- Network arrangement
- Deviations from the established configuration settings
- Frequency with which the configuration settings will be reviewed.
Links:
- https://web.nvd.nist.gov/view/800-53/Rev4/control?controlName=CM-2
- https://web.nvd.nist.gov/view/800-53/Rev4/control?controlName=CM-6
- https://web.nvd.nist.gov/view/800-53/Rev4/control?controlName=CM-7
Labels:
- CM
- CM-2
- CM-6
- CM-7
- security
- configuration
- baseline
As the Developer, I need to ensure that I am configuring my systems in a manner that is compliant with my organization's access control policy.
Why: The security of my application and related systems is paramount to my project's success.
How:
- Build all systems from my organization's baseline configuration (CM-2).
- Document all configuration settings and deviations from the established configuration settings. The configuration should provide only essential capabilities, and should restrict access to unused functions, ports and protocols (CM-7).
- Monitor and control changes to the configuration settings.
Acceptance Criteria / Evidence:
- Document the system's security configuration, including:
- Steps to install the application
- Steps to run the application
- Steps to test the application
- The use of the baseline configuration
- All deviations from the established configuration settings
Links:
- https://web.nvd.nist.gov/view/800-53/Rev4/control?controlName=CM-2
- https://web.nvd.nist.gov/view/800-53/Rev4/control?controlName=CM-6
- https://web.nvd.nist.gov/view/800-53/Rev4/control?controlName=CM-7
Labels:
- CM
- CM-2
- CM-6
- CM-7
- security
- configuration
- baseline
- developer
As the CISO, I want to maintain a centralized inventory of IT system components such as hardware, software licenses, and their respective owners.
Why: Maintaining an inventory helps ensure that components are up-to-date and helps in addressing security vulnerability alerts.
How:
- Determine the necessary information to collect.
- Collect an initial inventory of IT system components.
- Review the inventory in a predetermined frequency.
Acceptance Criteria / Evidence:
- Inventory specifications. Examples:
- Manufacturer
- Device type
- Model
- Serial number
- Physical location
- Personnel responsible
- Frequency that inventory will be reviewed
- Inventory of components, including:
- Hardware
- Software license information
- Software version numbers
- Machine names and network addresses for networked components or devices
Links:
Labels:
- CM
- CM-8
- security
- inventory
As the CISO, I need to ensure that we are not opening ourselves up to security vulnerabilities with the software individual personal install on their systems.
Why: Oftentimes employees are unaware of the potential security risks of installing third party software packages, or are in such need to a specific feature that they quickly install a package without properly evaluating its security ramifications.
How:
- Establish permitted and prohibited actions regarding software installation. Permitted actions may include:
- Updates and security patches to existing software
- Downloading applications from organization-approved app stores Example prohibited actions:
- Software with unknown or suspect pedigrees
- Software that organizations consider potentially malicious.
- Enforce the software installation policies.
- Frequently monitor the policies to ensure compliance.
Acceptance Criteria / Evidence:
- Software installation policy
- Software policy enforcement plan
- Frequency with with the software policy will be monitored
Links:
Labels:
- CM
- CM-11
- security
- software
- policy
Why: I need to ensure that it is impossible for outsiders to gain access to sensitive or confidential information on my personal computer or mobile devices, especially in the case that one of these devices is lost.
How:
- Follow the organization's guidelines on permitted and prohibited actions regarding software installation.
- Frequently monitor all local devices using organization-approved guidelines and scanners.
Acceptance Criteria / Evidence:
- Properly configure all computers and devices
- Log of security scanners running on all devices
Links:
Labels:
- CM
- CM-11
- security
- software
- policy
- developer