Under active development Content is continuously updated and improved

CM-3(6)Configuration Change Control | Cryptography Management

IL4 High
IL5
IL6

>Control Description

Ensure that cryptographic mechanisms used to provide the following controls are under configuration management: organization-defined controls.

>DoD Impact Level Requirements

FedRAMP Parameter Values

CM-3 (6) All security safeguards that rely on cryptography

>Discussion

The controls referenced in the control enhancement refer to security and privacy controls from the control catalog. Regardless of the cryptographic mechanisms employed, processes and procedures are in place to manage those mechanisms. For example, if system components use certificates for identification and authentication, a process is implemented to address the expiration of those certificates.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CM-3(6) (Cryptography Management)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CM-3(6)?
  • How frequently is the CM-3(6) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CM-3(6)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CM-3(6) requirements.
  • What automated tools, systems, or technologies are deployed to implement CM-3(6)?
  • How is CM-3(6) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CM-3(6) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CM-3(6)?
  • What audit logs, records, reports, or monitoring data validate CM-3(6) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CM-3(6) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CM-3(6) compliance?

Ask AI

Configure your API key to use AI features.