Vigyata.AI
Is this your channel?

Episode 1 CONFIGURATION MGMT POLICY AND PROCEDURE (CM-1)

2.0K views· 86 likes· 14:18· Nov 21, 2023

🛍️ Products Mentioned (4)

In this second season first episode of the NIST SP 800-53 Security Control explanantions, We reviewed the CM-1 Configuration Management Policy and Procedure trying to simplify what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION** ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 E-Mail: Kaamilzak@gmail.com

About This Video

In this episode, I kick off my Configuration Management control explanatory series by breaking down NIST SP 800-53 CM-1: Configuration Management Policy and Procedure. Before we even touch the control language, I explain why configuration management matters: you’re managing and controlling changes to system configuration across the lifecycle so you don’t introduce unexpected vulnerabilities. That includes hardware, software, firmware, documentation—everything that makes up your baseline. The whole point is to maintain oversight so people can’t just make production changes without authorization and without going through the proper Change Control Board (CCB) approvals. Then I walk through the actual CM-1 requirements in Rev. 5, including what you must develop, document, and disseminate, and who it should go to (organization-defined personnel/roles). I also highlight key Rev. 5 additions—like aligning the policy with applicable federal laws, executive orders, directives, regulations, standards, and guidelines, plus designating an official to manage development and dissemination. Finally, I cover how to assess/test CM-1: obtain and examine the policy/procedure and SSP, verify review/update frequency, confirm signatures, and validate dissemination (for example, SharePoint evidence showing who has access).

Frequently Asked Questions

🎬 More from KamilSec