CM-1 |
CONFIGURATION MANAGEMENT POLICY AND PROCEDURES |
Inherited and Compliant |
CM-2 |
BASELINE CONFIGURATION |
Inherited and Compliant |
CM-3 |
CONFIGURATION CHANGE CONTROL |
Inherited |
CM-4 |
SECURITY IMPACT ANALYSIS |
Inherited |
CM-5 |
ACCESS RESTRICTIONS FOR CHANGE |
Inherited |
CM-6 |
CONFIGURATION SETTINGS |
Inherited and Compliant |
CM-7 |
LEAST FUNCTIONALITY |
Inherited and Compliant |
CM-8 |
INFORMATION SYSTEM COMPONENT INVENTORY |
Inherited and Compliant |
CM-9 |
CONFIGURATION MANAGEMENT PLAN |
Inherited |
CM-10 |
SOFTWARE USAGE RESTRICTIONS |
Inherited |
CM-11 |
USER-INSTALLED SOFTWARE |
Inherited |