Skip to main content

CFG-01: Configuration Management Program

CFG 9 — Critical Govern

Mechanisms exist to facilitate the implementation of configuration management controls.

Control Question: Does the organization facilitate the implementation of configuration management controls?

General (52)
Framework Mapping Values
AICPA TSC 2017:2022 (used for SOC 2) (source) CC7.1 CC7.1-POF1 CC8.1-POF12 CC8.1-POF6
CIS CSC 8.1 2 4 4.1 4.2
CIS CSC 8.1 IG1 4.1
CIS CSC 8.1 IG2 4.1
CIS CSC 8.1 IG3 4.1
COBIT 2019 BAI10.01 BAI10.02 BAI10.03 BAI10.04 BAI10.05 DSS06.06
CSA CCM 4 UEM-03 UEM-07
CSA IoT SCF 2 CCM-02 CCM-08
GovRAMP Core CM-09
GovRAMP Low CM-01
GovRAMP Low+ CM-01 CM-09
GovRAMP Moderate CM-01 CM-09
GovRAMP High CM-01 CM-09
IEC TR 60601-4-5 2021 4.2 5.1
IEC 62443-4-2 2019 CR 7.6 (11.8.1)
ISO 27002 2022 8.3 8.9 8.12
ISO 27017 2015 9.4.1
MITRE ATT&CK 10 T1001, T1001.001, T1001.002, T1001.003, T1003, T1003.001, T1003.002, T1003.003, T1003.004, T1003.005, T1003.006, T1003.007, T1003.008, T1008, T1011, T1011.001, T1020.001, T1021, T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1027, T1029, T1030, T1036, T1036.001, T1036.003, T1036.005, T1036.007, T1037, T1037.002, T1037.003, T1037.004, T1037.005, T1046, T1047, T1048, T1048.001, T1048.002, T1048.003, T1052, T1052.001, T1053, T1053.002, T1053.005, T1055, T1055.008, T1056.003, T1059, T1059.001, T1059.002, T1059.003, T1059.004, T1059.005, T1059.006, T1059.007, T1059.008, T1068, T1070, T1070.001, T1070.002, T1070.003, T1071, T1071.001, T1071.002, T1071.003, T1071.004, T1072, T1078, T1078.002, T1078.003, T1078.004, T1087, T1087.001, T1087.002, T1090, T1090.001, T1090.002, T1090.003, T1091, T1092, T1095, T1098, T1098.001, T1098.002, T1098.003, T1098.004, T1102, T1102.001, T1102.002, T1102.003, T1104, T1105, T1106, T1110, T1110.001, T1110.002, T1110.003, T1110.004, T1111, T1114, T1114.002, T1114.003, T1119, T1127, T1127.001, T1132, T1132.001, T1132.002, T1133, T1134, T1134.001, T1134.002, T1134.003, T1134.005, T1135, T1136, T1136.001, T1136.002, T1136.003, T1137, T1137.001, T1137.002, T1137.003, T1137.004, T1137.005, T1137.006, T1176, T1187, T1189, T1190, T1197, T1199, T1201, T1204, T1204.001, T1204.002, T1204.003, T1205, T1205.001, T1210, T1211, T1212, T1213, T1213.001, T1213.002, T1216, T1216.001, T1218, T1218.001, T1218.002, T1218.003, T1218.004, T1218.005, T1218.007, T1218.008, T1218.009, T1218.012, T1218.013, T1218.014, T1219, T1220, T1221, T1222, T1222.001, T1222.002, T1482, T1484, T1489, T1490, T1495, T1498, T1498.001, T1498.002, T1499, T1499.001, T1499.002, T1499.003, T1499.004, T1505, T1505.001, T1505.002, T1505.003, T1505.004, T1525, T1528, T1530, T1537, T1539, T1542, T1542.001, T1542.003, T1542.004, T1542.005, T1543, T1543.002, T1546, T1546.002, T1546.003, T1546.004, T1546.006, T1546.008, T1546.013, T1546.014, T1547.002, T1547.003, T1547.005, T1547.006, T1547.007, T1547.008, T1547.011, T1547.013, T1548, T1548.001, T1548.002, T1548.003, T1548.004, T1550, T1550.001, T1550.002, T1550.003, T1552, T1552.001, T1552.002, T1552.003, T1552.004, T1552.005, T1552.006, T1552.007, T1553, T1553.001, T1553.003, T1553.004, T1553.005, T1554, T1555.004, T1555.005, T1556, T1556.001, T1556.002, T1556.003, T1556.004, T1557, T1557.001, T1557.002, T1558, T1558.001, T1558.002, T1558.003, T1558.004, T1559, T1559.001, T1559.002, T1562, T1562.001, T1562.002, T1562.003, T1562.004, T1562.006, T1562.009, T1562.010, T1563, T1563.001, T1563.002, T1564.002, T1564.006, T1564.007, T1564.009, T1565, T1565.001, T1565.002, T1565.003, T1566, T1566.001, T1566.002, T1569, T1569.002, T1570, T1571, T1572, T1573, T1573.001, T1573.002, T1574, T1574.001, T1574.004, T1574.005, T1574.006, T1574.007, T1574.008, T1574.009, T1574.010, T1598, T1598.002, T1598.003, T1599, T1599.001, T1601, T1601.001, T1601.002, T1602, T1602.001, T1602.002, T1609, T1610, T1611, T1612, T1613
MPA Content Security Program 5.1 TS-2.6
NIST Privacy Framework 1.0 PR.PO-P1
NIST 800-53 R4 CM-1 CM-9
NIST 800-53 R4 (low) CM-1
NIST 800-53 R4 (moderate) CM-1 CM-9
NIST 800-53 R4 (high) CM-1 CM-9
NIST 800-53 R5 (source) CM-1 CM-9
NIST 800-53B R5 (privacy) (source) CM-1
NIST 800-53B R5 (low) (source) CM-1
NIST 800-53B R5 (moderate) (source) CM-1 CM-9
NIST 800-53B R5 (high) (source) CM-1 CM-9
NIST 800-82 R3 LOW OT Overlay CM-1
NIST 800-82 R3 MODERATE OT Overlay CM-1 CM-9
NIST 800-82 R3 HIGH OT Overlay CM-1 CM-9
NIST 800-160 3.3.5 3.4.7 3.4.8
NIST 800-161 R1 CM-1 CM-9
NIST 800-161 R1 C-SCRM Baseline CM-1
NIST 800-161 R1 Flow Down CM-9
NIST 800-161 R1 Level 1 CM-1
NIST 800-161 R1 Level 2 CM-1 CM-9
NIST 800-161 R1 Level 3 CM-1 CM-9
NIST 800-171 R2 (source) NFO-CM-1 NFO-CM-9
NIST 800-171 R3 (source) 03.04.01.a
NIST 800-171A R3 (source) A.03.04.03.a
NIST 800-207 NIST Tenet 5
NIST CSF 2.0 (source) PR.PS PR.PS-01 PR.PS-05
OWASP Top 10 2021 A05:2021
PCI DSS 4.0.1 (source) 2.1 2.2 8.5
SPARTA CM0023
TISAX ISA 6 5.3.1
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) CFG-01
SCF CORE ESP Level 1 Foundational CFG-01
SCF CORE ESP Level 2 Critical Infrastructure CFG-01
SCF CORE ESP Level 3 Advanced Threats CFG-01
US (28)
Framework Mapping Values
US CERT RMM 1.2 TM:SG4.SP2
US CISA CPG 2022 2.A 2.O 2.Q
US CMS MARS-E 2.0 CM-1 CM-9
US DHS CISA TIC 3.0 3.UNI.CMANA
US FedRAMP R4 CM-1 CM-9
US FedRAMP R4 (low) CM-1
US FedRAMP R4 (moderate) CM-1 CM-9
US FedRAMP R4 (high) CM-1 CM-9
US FedRAMP R4 (LI-SaaS) CM-1
US FedRAMP R5 (source) CM-1 CM-9
US FedRAMP R5 (low) (source) CM-1
US FedRAMP R5 (moderate) (source) CM-1 CM-9
US FedRAMP R5 (high) (source) CM-1 CM-9
US FedRAMP R5 (LI-SaaS) (source) CM-1
US HIPAA Administrative Simplification 2013 (source) 164.308(a)(1)(i)
US HIPAA Security Rule / NIST SP 800-66 R2 (source) 164.308(a)(1)(i)
US HIPAA HICP Small Practice 1.S.A 2.S.A 3.S.A 6.S.B 6.S.C
US HIPAA HICP Medium Practice 1.M.A 2.M.A 9.M.A 9.M.B
US HIPAA HICP Large Practice 1.M.A 2.M.A 9.M.A 9.M.B 2.L.A
US IRS 1075 CM-1 CM-9
US NERC CIP 2024 (source) CIP-003-8 1.1.7 CIP-010-3 R1
US NISPOM 2020 8-311 8-610
US NNPI (unclass) 5.1 5.2
US - CA CCPA 2025 7123(c)(11) 7123(c)(4)(B) 7123(c)(5)
US - CO Colorado Privacy Act 6-1-1305(4)
US - TX DIR Control Standards 2.0 CM-1
US - TX TX-RAMP Level 1 CM-1
US - TX TX-RAMP Level 2 CM-1 CM-9
EMEA (16)
APAC (5)
Framework Mapping Values
APAC India SEBI CSCRF PR.IP.S3
APAC Japan ISMAP 9.4.1 9.4.1.8.PB
APAC New Zealand NZISM 3.6 4.3.19.C.01 12.2.5.C.01 12.2.5.C.02 12.2.6.C.01 12.2.6.C.02 18.1.10.C.01 18.1.10.C.02 18.1.10.C.03 18.1.10.C.04
APAC Singapore Cyber Hygiene Practice 4.3(a)
APAC Singapore MAS TRM 2021 7.2.1 7.2.2 7.3.1 7.3.2 7.3.3
Americas (3)
Framework Mapping Values
Americas Bermuda BMACCC 6.1
Americas Canada OSFI B-13 3.2.8
Americas Canada ITSP-10-171 03.04.01.A

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to facilitate the implementation of configuration management controls.

Level 1 — Performed Informally

Configuration Management (CFG) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Standardized across the organization. o Consistently aligned with industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides).

  • IT personnel use an informal process to design, build and maintain secure configurations for test, development, staging and production environments.
  • Secure configurations are not:
Level 2 — Planned & Tracked

Configuration Management (CFG) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Configuration management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for configuration management.
  • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
  • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data.
  • Apart from workstation and server operating system baselines, configuration management is decentralized.
  • Cybersecurity personnel use a structured process to design, build and maintain secure configurations for test, development, staging and production environments.
  • Deviations to baseline configurations are required to have a risk assessment and the business process owner acceptance of the risk(s) associated with the deviation.
  • Unauthorized configuration changes are investigated to determine if the unauthorized configuration is malicious in nature.
  • Logical Access Control (LAC) is enforced to prohibit non-administrative users from being able to install unauthorized software.
Level 3 — Well Defined

Configuration Management (CFG) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: Unauthorized configuration changes are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.

  • The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for secure configuration management practices.
  • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization with regards to secure configuration management.
  • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data to ensure that secure configuration management are identified and documented.
  • A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including secure configuration management to provide clear and authoritative accountability for secure configuration management operations.
  • The configuration management function is formally assigned with defined roles and responsibilities.
  • An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity and data privacy obligations are addressed to ensure secure configurations are designed, built and maintained.
  • Configuration management is centralized for all operating systems, applications, servers and other configurable technologies.
  • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including test, development, staging and production environments.
  • Configurations conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments.
  • Deviations to baseline configurations are required to have a risk assessment and business process owner approval of the risk(s) associated with the deviation.
  • Special baseline configurations are created for higher-risk environments or for systems, applications and services that store, process or transmit sensitive/regulated data.
  • An IT Asset Management (ITAM) function, or similar function, ensures compliance with requirements for asset management.
  • Logical Access Control (LAC) is used to limit the ability of non-administrators from making configuration changes to systems, applications and services, including the of installation of unauthorized software.
  • A Security Incident Event Manager (SIEM), or similar automated tool, monitors for unauthorized activities, accounts, connections, devices and software.
Level 4 — Quantitatively Controlled

Configuration Management (CFG) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving

Configuration Management (CFG) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
  • Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.

Assessment Objectives

  1. CFG-01_A01 the scope for the configuration management plan is organization-wide.
  2. CFG-01_A02 the types of changes to the system that are configuration-controlled are defined.
  3. CFG-01_A03 a configuration management plan for systems, applications and services is developed and documented.
  4. CFG-01_A04 a configuration management plan for systems, applications and services is implemented.
  5. CFG-01_A05 the current configuration management policy is reviewed / updated organization-defined frequency.
  6. CFG-01_A06 the current configuration management policy is reviewed / updated following organization-defined events.
  7. CFG-01_A07 personnel or roles to review and approve the configuration management plan is/are defined.
  8. CFG-01_A08 the configuration management plan addresses roles.
  9. CFG-01_A09 the configuration management plan addresses responsibilities.
  10. CFG-01_A10 the configuration management plan addresses configuration management processes and procedures.
  11. CFG-01_A11 the configuration management plan establishes a process for identifying configuration items throughout the system development life cycle.
  12. CFG-01_A12 the configuration management plan establishes a process for managing the configuration of the configuration items.
  13. CFG-01_A13 the configuration management plan defines the configuration items for the system.
  14. CFG-01_A14 the configuration management plan places the configuration items under configuration management.
  15. CFG-01_A15 the configuration management plan is reviewed and approved by organization-defined personnel or roles.
  16. CFG-01_A16 the configuration management plan is protected from unauthorized disclosure.
  17. CFG-01_A17 the configuration management plan is protected from unauthorized modification.
  18. CFG-01_A18 configuration management operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
  19. CFG-01_A19 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support configuration management operations.
  20. CFG-01_A20 responsibility and authority for the performance of configuration management-related activities are assigned to designated personnel.
  21. CFG-01_A21 personnel performing configuration management-related activities have the skills and knowledge needed to perform their assigned duties.

Evidence Requirements

E-AST-01 IT Asset Management (ITAM)

Documented evidence of an IT Asset Management (ITAM) program that addresses the due diligence and due care activities associated with maintaining both secure and compliant systems, applications and services.

Asset Management
E-AST-27 Configuration Management

Documented evidence of standardized configuration management practices.

Asset Management

Technology Recommendations

Micro/Small

  • Configuration Management (CM) program
  • Change control program

Small

  • Configuration Management (CM) program
  • Change control program

Medium

  • Configuration Management (CM) program
  • Change control program

Large

  • Configuration Management (CM) program
  • Change control program

Enterprise

  • Configuration Management (CM) program
  • Change control program

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.