CFG-01: Configuration Management Program
Mechanisms exist to facilitate the implementation of configuration management controls.
Control Question: Does the organization facilitate the implementation of configuration management controls?
General (52)
| Framework | Mapping Values |
|---|---|
| AICPA TSC 2017:2022 (used for SOC 2) (source) | CC7.1 CC7.1-POF1 CC8.1-POF12 CC8.1-POF6 |
| CIS CSC 8.1 | 2 4 4.1 4.2 |
| CIS CSC 8.1 IG1 | 4.1 |
| CIS CSC 8.1 IG2 | 4.1 |
| CIS CSC 8.1 IG3 | 4.1 |
| COBIT 2019 | BAI10.01 BAI10.02 BAI10.03 BAI10.04 BAI10.05 DSS06.06 |
| CSA CCM 4 | UEM-03 UEM-07 |
| CSA IoT SCF 2 | CCM-02 CCM-08 |
| GovRAMP Core | CM-09 |
| GovRAMP Low | CM-01 |
| GovRAMP Low+ | CM-01 CM-09 |
| GovRAMP Moderate | CM-01 CM-09 |
| GovRAMP High | CM-01 CM-09 |
| IEC TR 60601-4-5 2021 | 4.2 5.1 |
| IEC 62443-4-2 2019 | CR 7.6 (11.8.1) |
| ISO 27002 2022 | 8.3 8.9 8.12 |
| ISO 27017 2015 | 9.4.1 |
| MITRE ATT&CK 10 | T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1008, T1011, T1011.001, T1020.001, T1021, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1027, T1029, T1030, T1036, T1036.001, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.002, T1053.005, T1055, T1055.008, T1056.003, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1078, T1078.002, T1078.003, T1078.004, T1087, T1087.001, T1087.002, T1090, T1090.001, T1090.002, T1090.003, T1091, T1092, T1095, T1098, T1098.001, T1098.002, T1098.003, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1114, T1114.002, T1114.003, T1119, T1127, T1127.001, T1132, T1132.001, T1132.002, T1133, T1134, T1134.001, T1134.002, T1134.003, T1134.005, T1135, T1136, T1136.001, T1136.002, T1136.003, T1137, T1137.001, T1137.002, T1137.003, T1137.004, T1137.005, T1137.006, T1176, T1187, T1189, T1190, T1197, T1199, T1201, T1204, T1204.001, T1204.002, T1204.003, T1205, T1205.001, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.007, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1222, T1222.001, T1222.002, T1482, T1484, T1489, T1490, T1495, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1505, T1505.001, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1537, T1539, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1546, T1546.002, T1546.003, T1546.004, T1546.006, T1546.008, T1546.013, T1546.014, T1547.002, T1547.003, T1547.005, T1547.006, T1547.007, T1547.008, T1547.011, T1547.013, T1548, T1548.001, T1548.002, T1548.003, T1548.004, T1550, T1550.001, T1550.002, T1550.003, T1552, T1552.001, T1552.002, T1552.003, T1552.004, T1552.005, T1552.006, T1552.007, T1553, T1553.001, T1553.003, T1553.004, T1553.005, T1554, T1555.004, T1555.005, T1556, T1556.001, T1556.002, T1556.003, T1556.004, T1557, T1557.001, T1557.002, T1558, T1558.001, T1558.002, T1558.003, T1558.004, T1559, T1559.001, T1559.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.009, T1562.010, T1563, T1563.001, T1563.002, T1564.002, T1564.006, T1564.007, T1564.009, T1565, T1565.001, T1565.002, T1565.003, T1566, T1566.001, T1566.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.004, T1574.005, T1574.006, T1574.007, T1574.008, T1574.009, T1574.010, T1598, T1598.002, T1598.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002, T1609, T1610, T1611, T1612, T1613 |
| MPA Content Security Program 5.1 | TS-2.6 |
| NIST Privacy Framework 1.0 | PR.PO-P1 |
| NIST 800-53 R4 | CM-1 CM-9 |
| NIST 800-53 R4 (low) | CM-1 |
| NIST 800-53 R4 (moderate) | CM-1 CM-9 |
| NIST 800-53 R4 (high) | CM-1 CM-9 |
| NIST 800-53 R5 (source) | CM-1 CM-9 |
| NIST 800-53B R5 (privacy) (source) | CM-1 |
| NIST 800-53B R5 (low) (source) | CM-1 |
| NIST 800-53B R5 (moderate) (source) | CM-1 CM-9 |
| NIST 800-53B R5 (high) (source) | CM-1 CM-9 |
| NIST 800-82 R3 LOW OT Overlay | CM-1 |
| NIST 800-82 R3 MODERATE OT Overlay | CM-1 CM-9 |
| NIST 800-82 R3 HIGH OT Overlay | CM-1 CM-9 |
| NIST 800-160 | 3.3.5 3.4.7 3.4.8 |
| NIST 800-161 R1 | CM-1 CM-9 |
| NIST 800-161 R1 C-SCRM Baseline | CM-1 |
| NIST 800-161 R1 Flow Down | CM-9 |
| NIST 800-161 R1 Level 1 | CM-1 |
| NIST 800-161 R1 Level 2 | CM-1 CM-9 |
| NIST 800-161 R1 Level 3 | CM-1 CM-9 |
| NIST 800-171 R2 (source) | NFO-CM-1 NFO-CM-9 |
| NIST 800-171 R3 (source) | 03.04.01.a |
| NIST 800-171A R3 (source) | A.03.04.03.a |
| NIST 800-207 | NIST Tenet 5 |
| NIST CSF 2.0 (source) | PR.PS PR.PS-01 PR.PS-05 |
| OWASP Top 10 2021 | A05:2021 |
| PCI DSS 4.0.1 (source) | 2.1 2.2 8.5 |
| SPARTA | CM0023 |
| TISAX ISA 6 | 5.3.1 |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | CFG-01 |
| SCF CORE ESP Level 1 Foundational | CFG-01 |
| SCF CORE ESP Level 2 Critical Infrastructure | CFG-01 |
| SCF CORE ESP Level 3 Advanced Threats | CFG-01 |
US (28)
EMEA (16)
| Framework | Mapping Values |
|---|---|
| EMEA EU DORA | 9.3(a) 9.3(b) 9.3(c) 9.3(d) |
| EMEA EU NIS2 Annex | 6.3.1 6.3.2 |
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Germany Banking Supervisory Requirements for IT (BAIT) | 6.8 |
| EMEA Germany C5 2020 | AM-03 |
| EMEA Israel CDMO 1.0 | 3.3 9.22 9.23 14.1 |
| EMEA Saudi Arabia CSCC-1 2019 | 2-3-1-6 |
| EMEA Saudi Arabia ECC-1 2018 | 1-6-2-2 2-4-4 2-5-4 |
| EMEA Saudi Arabia SACS-002 | TPC-2 |
| EMEA Spain BOE-A-2022-7191 | 30.1 30.2 |
| EMEA Spain 311/2022 | 30.1 30.2 |
| EMEA Spain CCN-STIC 825 | 7.3.3 [OP.EXP.3] |
| EMEA UK CAF 4.0 | B4 B4.c |
| EMEA UK CAP 1850 | B4 |
| EMEA UK Cyber Essentials | 2 |
APAC (5)
| Framework | Mapping Values |
|---|---|
| APAC India SEBI CSCRF | PR.IP.S3 |
| APAC Japan ISMAP | 9.4.1 9.4.1.8.PB |
| APAC New Zealand NZISM 3.6 | 4.3.19.C.01 12.2.5.C.01 12.2.5.C.02 12.2.6.C.01 12.2.6.C.02 18.1.10.C.01 18.1.10.C.02 18.1.10.C.03 18.1.10.C.04 |
| APAC Singapore Cyber Hygiene Practice | 4.3(a) |
| APAC Singapore MAS TRM 2021 | 7.2.1 7.2.2 7.3.1 7.3.2 7.3.3 |
Americas (3)
| Framework | Mapping Values |
|---|---|
| Americas Bermuda BMACCC | 6.1 |
| Americas Canada OSFI B-13 | 3.2.8 |
| Americas Canada ITSP-10-171 | 03.04.01.A |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to facilitate the implementation of configuration management controls.
Level 1 — Performed Informally
Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).
- IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments.
- Secure configurations are not:
Level 2 — Planned & Tracked
Configuration Management (CFG) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management.
- Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
- Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data.
- Apart from workstation and server operating system baselines, configuration management is decentralized.
- Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments.
- Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation.
- Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature.
- Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Level 3 — Well Defined
Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
- The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for secure configuration management practices.
- The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization with regards to secure configuration management.
- A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data to ensure that secure configuration management are identified and documented.
- A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including secure configuration management to provide clear and authoritative accountability for secure configuration management operations.
- The configuration management function is formally assigned with defined roles and responsibilities.
- An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity and data privacy obligations are addressed to ensure secure configurations are designed, built and maintained.
- Configuration management is centralized for all operating systems, applications, servers and other configurable technologies.
- Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments.
- Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments.
- Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation.
- Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data.
- An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management.
- Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software.
- A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software.
Level 4 — Quantitatively Controlled
Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
- Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
Assessment Objectives
- CFG-01_A01 the scope for the configuration management plan is organization-wide.
- CFG-01_A02 the types of changes to the system that are configuration-controlled are defined.
- CFG-01_A03 a configuration management plan for systems, applications and services is developed and documented.
- CFG-01_A04 a configuration management plan for systems, applications and services is implemented.
- CFG-01_A05 the current configuration management policy is reviewed / updated organization-defined frequency.
- CFG-01_A06 the current configuration management policy is reviewed / updated following organization-defined events.
- CFG-01_A07 personnel or roles to review and approve the configuration management plan is/are defined.
- CFG-01_A08 the configuration management plan addresses roles.
- CFG-01_A09 the configuration management plan addresses responsibilities.
- CFG-01_A10 the configuration management plan addresses configuration management processes and procedures.
- CFG-01_A11 the configuration management plan establishes a process for identifying configuration items throughout the system development life cycle.
- CFG-01_A12 the configuration management plan establishes a process for managing the configuration of the configuration items.
- CFG-01_A13 the configuration management plan defines the configuration items for the system.
- CFG-01_A14 the configuration management plan places the configuration items under configuration management.
- CFG-01_A15 the configuration management plan is reviewed and approved by organization-defined personnel or roles.
- CFG-01_A16 the configuration management plan is protected from unauthorized disclosure.
- CFG-01_A17 the configuration management plan is protected from unauthorized modification.
- CFG-01_A18 configuration management operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
- CFG-01_A19 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support configuration management operations.
- CFG-01_A20 responsibility and authority for the performance of configuration management-related activities are assigned to designated personnel.
- CFG-01_A21 personnel performing configuration management-related activities have the skills and knowledge needed to perform their assigned duties.
Evidence Requirements
- E-AST-01 IT Asset Management (ITAM)
-
Documented evidence of an IT Asset Management (ITAM) program that addresses the due diligence and due care activities associated with maintaining both secure and compliant systems, applications and services.
Asset Management - E-AST-27 Configuration Management
-
Documented evidence of standardized configuration management practices.
Asset Management
Technology Recommendations
Micro/Small
- Configuration Management (CM) program
- Change control program
Small
- Configuration Management (CM) program
- Change control program
Medium
- Configuration Management (CM) program
- Change control program
Large
- Configuration Management (CM) program
- Change control program
Enterprise
- Configuration Management (CM) program
- Change control program