Configuration Management
Establish and maintain baseline configurations.
Baseline Configurations
Establish and maintain baseline configurations and inventories of organizational systems.
Configuration Settings
Establish and enforce security configuration settings for IT products.
Change Tracking
Track, review, approve/disapprove, and log changes to organizational systems.
Change Impact Analysis
Analyze the security impact of changes prior to implementation.
Access Restrictions for Change
Define, document, approve, and enforce physical and logical access restrictions.
Least Functionality
Employ the principle of least functionality by configuring systems to provide only essential capabilities.
Nonessential Functions
Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.
Application Execution Policy
Apply deny-by-exception (blacklist) or permit-by-exception (whitelist) policies for software execution.
User-Installed Software
Control and monitor user-installed software.