CM-7(9)—Least Functionality | Prohibiting The Use of Unauthorized Hardware
IL5
IL6
>Control Description
(a) Identify ⚙organization-defined hardware components authorized for system use;
(b) Prohibit the use or connection of unauthorized hardware components;
(c) Review and update the list of authorized hardware components ⚙organization-defined frequency.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Hardware components provide the foundation for organizational systems and the platform for the execution of authorized software programs. Managing the inventory of hardware components and controlling which hardware components are permitted to be installed or connected to organizational systems is essential in order to provide adequate security.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of CM-7(9) (Prohibiting The Use Of Unauthorized Hardware)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring CM-7(9)?
- •How frequently is the CM-7(9) policy reviewed and updated, and what triggers policy changes?
- •What training or awareness programs ensure personnel understand their responsibilities related to CM-7(9)?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce CM-7(9) requirements.
- •What automated tools, systems, or technologies are deployed to implement CM-7(9)?
- •How is CM-7(9) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce CM-7(9) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of CM-7(9)?
- •What audit logs, records, reports, or monitoring data validate CM-7(9) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of CM-7(9) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate CM-7(9) compliance?
Ask AI
Configure your API key to use AI features.