compliance controls are associated with this Policy definition 'Review changes for any unauthorized changes' (c246d146-82b0-301f-32e7-1065dcd248b7)
Control Domain |
Control |
Name |
MetadataId |
Category |
Title |
Owner |
Requirements |
Description |
Info |
Policy# |
FedRAMP_High_R4 |
CM-5(2) |
FedRAMP_High_R4_CM-5(2) |
FedRAMP High CM-5 (2) |
Configuration Management |
Review System Changes |
Shared |
n/a |
The organization reviews information system changes [Assignment: organization-defined frequency] and [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.
Supplemental Guidance: Indications that warrant review of information system changes and the specific circumstances justifying such reviews may be obtained from activities carried out by organizations during the configuration change process. Related controls: AU-6, AU-7, CM-3, CM-5, PE-6, PE-8. |
link |
1 |
hipaa |
0821.09m2Organizational.2-09.m |
hipaa-0821.09m2Organizational.2-09.m |
0821.09m2Organizational.2-09.m |
08 Network Protection |
0821.09m2Organizational.2-09.m 09.06 Network Security Management |
Shared |
n/a |
The organization tests and approves all network connections and firewall, router, and switch configuration changes prior to implementation. Any deviations from the standard configuration or updates to the standard configuration are documented and approved in a change control system. All new configuration rules beyond a baseline-hardened configuration that allow traffic to flow through network security devices, such as firewalls and network-based IPS, are also documented and recorded, with a specific business reason for each change, a specific individual’s name responsible for that business need, and an expected duration of the need. |
|
18 |
hipaa |
0828.09m3Organizational.8-09.m |
hipaa-0828.09m3Organizational.8-09.m |
0828.09m3Organizational.8-09.m |
08 Network Protection |
0828.09m3Organizational.8-09.m 09.06 Network Security Management |
Shared |
n/a |
Quarterly network scans are performed to identify unauthorized components/devices. |
|
1 |
ISO27001-2013 |
A.12.4.1 |
ISO27001-2013_A.12.4.1 |
ISO 27001:2013 A.12.4.1 |
Operations Security |
Event Logging |
Shared |
n/a |
Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed. |
link |
53 |
NIST_SP_800-171_R2_3 |
.4.5 |
NIST_SP_800-171_R2_3.4.5 |
NIST SP 800-171 R2 3.4.5 |
Configuration Management |
Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems. |
Shared |
Microsoft and the customer share responsibilities for implementing this requirement. |
Any changes to the hardware, software, or firmware components of systems can potentially have significant effects on the overall security of the systems. Therefore, organizations permit only qualified and authorized individuals to access systems for purposes of initiating changes, including upgrades and modifications. Access restrictions for change also include software libraries. Access restrictions include physical and logical access control requirements, workflow automation, media libraries, abstract layers (e.g., changes implemented into external interfaces rather than directly into systems), and change windows (e.g., changes occur only during certain specified times). In addition to security concerns, commonly-accepted due diligence for configuration management includes access restrictions as an essential part in ensuring the ability to effectively manage the configuration. [SP 800-128] provides guidance on configuration change control. |
link |
6 |
NIST_SP_800-53_R4 |
CM-5(2) |
NIST_SP_800-53_R4_CM-5(2) |
NIST SP 800-53 Rev. 4 CM-5 (2) |
Configuration Management |
Review System Changes |
Shared |
n/a |
The organization reviews information system changes [Assignment: organization-defined frequency] and [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.
Supplemental Guidance: Indications that warrant review of information system changes and the specific circumstances justifying such reviews may be obtained from activities carried out by organizations during the configuration change process. Related controls: AU-6, AU-7, CM-3, CM-5, PE-6, PE-8. |
link |
1 |
|
op.exp.8 Recording of the activity |
op.exp.8 Recording of the activity |
404 not found |
|
|
|
n/a |
n/a |
|
67 |
PCI_DSS_v4.0 |
1.2.8 |
PCI_DSS_v4.0_1.2.8 |
PCI DSS v4.0 1.2.8 |
Requirement 01: Install and Maintain Network Security Controls |
Network security controls (NSCs) are configured and maintained |
Shared |
n/a |
Configuration files for NSCs are:
• Secured from unauthorized access.
• Kept consistent with active network configurations. |
link |
3 |