Vigyata.AI
Is this your channel?

Episode 6 Configuration Settings (CM-6)

1.0K views· 226 likes· 11:32· Jun 29, 2024

🛍️ Products Mentioned (5)

In this sixth episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-6 Configuration Settings as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** Buy me a coffee if you appreciate my work https://buymeacoffee.com/kamilsec CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION** ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 E-Mail: Kaamilzak@gmail.com

About This Video

In this episode of my Configuration Management explanatory series, I break down NIST SP 800-53 CM-6 (Configuration Settings) and simplify what the control is really asking you to do. The core requirement is straightforward: I need the organization to establish, document, and enforce secure configuration settings for system components—using the most restrictive settings that still meet operational needs. I also call out common secure configuration baselines you’ll see in real environments like USGCB, CIS Benchmarks, and STIGs, and why they matter when you’re building your configuration baseline. I walk through the CM-6 requirements in Rev. 5: define common secure configurations, implement them, identify/document/approve deviations, and monitor/control changes. I’m very clear on deviations—if a team can’t implement a benchmark or hardening step, that’s not “hand-waving”; it must be documented with rationale and approved based on operational requirements. Finally, I explain how to assess/test CM-6: review policies and procedures, interview key personnel (including the CCB), examine baseline settings, validate deviations and approvals, and evaluate continuous monitoring mechanisms—often using automated scanning tools to detect misconfigurations and unauthorized changes.

Frequently Asked Questions

🎬 More from KamilSec