CM-3(3)—Configuration Change Control
PBMM (P2)
Secret (P2)
Operational
>Control Description
CONFIGURATION CHANGE CONTROL | AUTOMATED CHANGE IMPLEMENTATION The organization employs automated mechanisms to implement changes to the current information system baseline and deploys the updated baseline across the installed base.
>Tailoring Guidance
This security control/enhancement should be addressed where applicable and if practical to do so. Control enhancement (3) is required to effectively manage deployments with at least some user base (e.g. standard desktop configuration) or with multiple instances of the same server (e.g. server farm). Only in cases where each user system and/or server is unique does it preclude the use of control enhancement (3).
An example of this is an update server part of an operating system.
Ask AI
Configure your API key to use AI features.