CMMC v2.0_CM.L2-3.4.6

CMMC v2.0

3.4 CONFIGURATION MANAGEMENT

CM.L2-3.4.6

Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.

Systems can provide a wide variety of functions and services. Some of the functions and services routinely provided by default may not be necessary to support essential organizational missions functions or operations. It is sometimes convenient to provide multiple services from single system components. However doing so increases risk over limiting the services provided by any one component. Where feasible organizations limit component functionality to a single function per component.Organizations review functions and services provided by systems or components of systems to determine which functions and services are candidates for elimination. Organizations disable unused or unnecessary physical and logical ports and protocols to prevent unauthorized connection of devices transfer of information and tunneling. Organizations can utilize network scanning tools intrusion detection and prevention systems and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions ports protocols and services.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video