Under active development Content is continuously updated and improved

CM-8(2)System Component Inventory | Automated Maintenance

IL4 High
IL5
IL6

>Control Description

Maintain the currency, completeness, accuracy, and availability of the inventory of system components using organization-defined automated mechanisms.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Organizations maintain system inventories to the extent feasible. For example, virtual machines can be difficult to monitor because such machines are not visible to the network when not in use. In such cases, organizations maintain as up-to-date, complete, and accurate an inventory as is deemed reasonable.

Automated maintenance can be achieved by the implementation of CM-2(2) for organizations that combine system component inventory and baseline configuration activities.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of CM-8(2) (Automated Maintenance)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring CM-8(2)?
  • How frequently is the CM-8(2) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to CM-8(2)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce CM-8(2) requirements.
  • What automated tools, systems, or technologies are deployed to implement CM-8(2)?
  • How is CM-8(2) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce CM-8(2) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of CM-8(2)?
  • What audit logs, records, reports, or monitoring data validate CM-8(2) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of CM-8(2) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate CM-8(2) compliance?

Ask AI

Configure your API key to use AI features.