CM-3(5)—Configuration Change Control
Operational
>Control Description
CONFIGURATION CHANGE CONTROL | AUTOMATED SECURITY RESPONSE The information system implements ⚙organization-defined security responses automatically if baseline configurations are changed in an unauthorized manner.
>Supplemental Guidance
Security responses include, for example, halting information system processing, halting selected system functions, or issuing alerts/notifications to organizational personnel when there is an unauthorized modification of a configuration item.
>Tailoring Guidance
This security control/enhancement specifies a very specialized and/or advanced capability that is not required for all systems. Consequently, inclusion in a departmental profile is made on a case by case basis.
Ask AI
Configure your API key to use AI features.