CM-1 Configuration Management Policy and Procedures

Description

This Control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, executive orders, directives, regulations, policies, standards, and guidance.

Security program policies and procedures at the organization level may make the need for system specific policies and procedures unnecessary.

The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations.

The procedures can be established for the security program in general and for particular information systems, if needed.

The organizational risk management strategy is a key factor in establishing policy and procedures.

Applicability

The intended audience includes, but is not limited to, custodians and/or owners of an information resource.

Implementation

TAMU-CC Chief Information Security and Privacy Officer (CISPO) shall:

  1. Develop document and disseminate to custodians:
    1. A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and
  2. Review and update the current:
    1. Configuration management policy annually; and
    2. Configuration management procedures annually.
  3. TAMU-CC shall control modifications to hardware, software, firmware, and documentation to ensure the information resources are protected against improper modification before, during, and after system implementation.

Revision History

Last Updated: February 21, 2025

Previous Versions:

  • June 29, 2023
  • May 31, 2022
  • March 25, 2021
  • September 16, 2019