Audit and Accountability (AU)

Protect audit information and audit logging tools from unauthorized access, modification, and deletion.


Login

Audit and Accountability (AU)

Limit management of audit logging functionality to a subset of privileged users.


Login

Configuration Management (CM)

Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.


Login

Configuration Management (CM)

Establish and enforce security configuration settings for information technology products employed in organizational systems.


Login

Configuration Management (CM)

Track, review, approve or disapprove, and log changes to organizational systems.


Login

Configuration Management (CM)

Analyze the security impact of changes prior to implementation.


Login

Configuration Management (CM)

Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.


Login

Configuration Management (CM)

Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.


Login

Configuration Management (CM)

Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.


Login

Configuration Management (CM)

Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.


Login