STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← CM-5 — Access Restrictions for Change

CCI-000345

Definition

Enforce logical access restrictions associated with changes to the system.

Parent Control

CM-5Access Restrictions for ChangeConfiguration Management

Linked STIG Checks (20)

V-222626CAT IIThe designer must ensure the application does not store configuration and control files in the same directory as user data.Application Security and Development Security Technical Implementation GuideV-242632CAT IIThe Cisco ISE must enforce access restrictions associated with changes to the firmware, OS, and hardware components.Cisco ISE NDM Security Technical Implementation GuideV-269801CAT IIThe Dell OS10 Switch must enforce access restrictions associated with changes to the system components.Dell OS10 Switch NDM Security Technical Implementation GuideV-255631CAT IICounterACT must enforce access restrictions associated with changes to the system components.ForeScout CounterACT NDM Security Technical Implementation GuideV-230951CAT IIForescout must enforce access restrictions associated with changes to the firmware, OS, USB port, and console port.Forescout Network Device Management Security Technical Implementation GuideV-234191CAT IIThe FortiGate device must enforce access restrictions associated with changes to the system components.Fortinet FortiGate Firewall NDM Security Technical Implementation GuideV-217480CAT IIThe HP FlexFabric Switch must enforce access restrictions associated with changes to the system components.HP FlexFabric Switch NDM Security Technical Implementation GuideV-258600CAT IThe ICS must be configured to prevent nonprivileged users from executing privileged functions.Ivanti Connect Secure NDM Security Technical Implementation GuideV-251003CAT IIIMobileIron Sentry must enforce access restrictions associated with changes to the system components.Ivanti MobileIron Sentry 9.x NDM Security Technical Implementation GuideV-251003CAT IIISentry must enforce access restrictions associated with changes to the system components.Ivanti Sentry 9.x NDM Security Technical Implementation GuideV-253940CAT IIThe Juniper EX switch must be configured to enforce access restrictions associated with changes to the system components.Juniper EX Series Switches Network Device Management Security Technical Implementation GuideV-202131CAT IIThe network device must enforce access restrictions associated with changes to the system components.Network Device Management Security Requirements GuideV-243151CAT IIThe network device must be configured with both an ingress and egress ACL.Network WLAN AP-IG Management Security Technical Implementation GuideV-243169CAT IIThe network device must be configured with both an ingress and egress ACL.Network WLAN AP-NIPR Management Security Technical Implementation GuideV-243187CAT IIThe network device must be configured with both an ingress and egress ACL.Network WLAN Bridge Management Security Technical Implementation GuideV-243205CAT IIThe network device must be configured with both an ingress and egress ACL.Network WLAN Controller Management Security Technical Implementation GuideV-279250CAT IThe Edge SWG must be configured to assign appropriate user roles or access levels to authenticated users.Symantec Edge SWG NDM Security Technical Implementation GuideV-242254CAT IThe TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.Trend Micro TippingPoint NDM Security Technical Implementation GuideV-265292CAT IThe NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.VMware NSX 4.x Manager NDM Security Technical Implementation GuideV-69211CAT IIThe NSX Manager must enforce access restrictions associated with changes to the system components.VMware NSX Manager Security Technical Implementation Guide