CM-6(2)—Configuration Settings
PBMM (P2)
Secret (P2)
Operational
>Control Description
CONFIGURATION SETTINGS | RESPOND TO UNAUTHORIZED CHANGES The organization employs ⚙organization-defined security safeguards to respond to unauthorized changes to ⚙organization-defined configuration settings.
>Supplemental Guidance
Responses to unauthorized changes to configuration settings can include, for example, alerting designated organizational personnel, restoring established configuration settings, or in extreme cases, halting affected information system processing. Related controls: IR-4, SI-7.
>Tailoring Guidance
Control enhancement (2) can be addressed using the same tools as for CM-5 (7).
Ask AI
Configure your API key to use AI features.