STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

CM-6

Configuration ManagementRev 5organization

Configuration Settings

Baselines:LowModerateHigh

Control Statement

a. Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using [Assignment: common secure configurations]; b. Implement the configuration settings; c. Identify, document, and approve any deviations from established configuration settings for [Assignment: system components] based on [Assignment: operational requirements] ; and d. Monitor and control changes to the configuration settings in accordance with organizational policies and procedures.

Supplemental Guidance

Configuration settings are the parameters that can be changed in the hardware, software, or firmware components of the system that affect the security and privacy posture or functionality of the system. Information technology products for which configuration settings can be defined include mainframe computers, servers, workstations, operating systems, mobile devices, input/output devices, protocols, and applications. Parameters that impact the security posture of systems include registry settings; account, file, or directory permission settings; and settings for functions, protocols, ports, services, and remote connections. Privacy parameters are parameters impacting the privacy posture of systems, including the parameters required to satisfy other privacy controls. Privacy parameters include settings for access controls, data processing preferences, and processing and retention permissions. Organizations establish organization-wide configuration settings and subsequently derive specific configuration settings for systems. The established settings become part of the configuration baseline for the system. Common secure configurations (also known as security configuration checklists, lockdown and hardening guides, and security reference guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for information technology products and platforms as well as instructions for configuring those products or platforms to meet operational requirements. Common secure configurations can be developed by a variety of organizations, including information technology product developers, manufacturers, vendors, federal agencies, consortia, academia, industry, and other organizations in the public and private sectors. Implementation of a common secure configuration may be mandated at the organization level, mission and business process level, system level, or at a higher level, including by a regulatory agency. Common secure configurations include the United States Government Configuration Baseline [USGCB](#98498928-3ca3-44b3-8b1e-f48685373087) and security technical implementation guides (STIGs), which affect the implementation of [CM-6](#cm-6) and other controls such as [AC-19](#ac-19) and [CM-7](#cm-7) . The Security Content Automation Protocol (SCAP) and the defined standards within the protocol provide an effective method to uniquely identify, track, and control configuration settings.

Related Controls (28)

AC-3AC-19AU-2AU-6CA-9CM-2CM-3CM-5CM-7CM-11CP-7CP-9CP-10IA-3IA-5PL-8PL-9RA-5SA-4SA-5SA-8

CCI Identifiers (18)

CCI-000365The organization documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists that reflect the most restrictive mode consistent with operational requirements.CCI-000367Identify any deviations from the established configuration settings for organization-defined system components based on organization-defined operational requirements.CCI-000368Document any deviations from the established configuration settings for organization-defined system components based on organization-defined operational requirements.CCI-000369Approve any deviations from the established configuration settings for organization-defined system components based on organization-defined operational requirements.CCI-001503The organization controls changes to the configuration settings in accordance with organizational policies and procedures.CCI-000364The organization establishes configuration settings for information technology products employed within the information system using organization-defined security configuration checklists.CCI-000366Implement the security configuration settings.

Linked STIG Checks (200)

Across 18 STIGs. Click to expand.

SA-9
SC-18
SC-28
SC-43
SI-2
SI-4
SI-6
CCI-001588
The organization-defined security configuration checklists reflect the most restrictive mode consistent with operational requirements.
CCI-003941Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using organization-defined common secure configurations.
CCI-003942Defines the common secure configurations for establishing and documenting configuration settings within the system, that reflect the most restrictive mode consistent with operational requirements.
CCI-001755Defines the system components for which any deviation from the established configuration settings are to be identified, documented, and approved.
CCI-003943Monitor changes to the configuration settings in accordance with organizational policies.
CCI-003944Monitor changes to the configuration settings in accordance with organizational procedures.
CCI-003945Control changes to the configuration settings in accordance with organizational policies.
CCI-003946Control changes to the configuration settings in accordance with organizational procedures.
CCI-001502The organization monitors changes to the configuration settings in accordance with organizational policies and procedures.
CCI-000363The organization defines security configuration checklists to be used to establish and document configuration settings for the information system technology products employed.
CCI-001756Defines the operational requirements on which the configuration settings for the organization-defined system components are to be based.