Vigyata.AI
Is this your channel?

Episode 3 Configuration Change Control (CM-3)

450 views· 38 likes· 10:15· Jun 14, 2024

🛍️ Products Mentioned (4)

In this third episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-3 Configuration Change Control as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION** ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 E-Mail: Kaamilzak@gmail.com

About This Video

In this third episode of my Configuration Management (CM) explanatory series, I break down NIST SP 800-53 CM-3: Configuration Change Control and simplify what the control is really asking you to do. I walk through the core idea: you don’t just “make changes” to a system—your organization needs a structured way to propose, review, approve/disapprove, implement, and keep records of those changes. I also explain the role of the Change Control Board (CCB) and why security impact analysis has to be explicitly considered before changes hit production. I also point out where CM-3 sits in Rev 5 (selected for Moderate and High systems, not Low) and go line-by-line through the requirements: determine what changes are configuration-controlled, document decisions, implement approved changes, retain records for an org-defined time period, and monitor/review change control activities. Then I shift into how I assess/test CM-3 as a security control assessor—what policies, plans, tickets, and baseline configuration documentation I request, and how I use real change samples (ServiceNow, Jira, Azure DevOps, etc.) to verify both design and operational effectiveness. I close by connecting CM-3 to what’s next—CM-4 Security Impact Analysis.

Frequently Asked Questions

🎬 More from KamilSec