STIGhub
STIGs
RMF Controls
Compare
← All Controls
CM-5 (3)
Configuration Management
Rev 3
Access Restrictions for Change
CCI Identifiers (6)
CCI-000351
The organization defines critical software programs that the information system will prevent from being installed if such software programs are not signed with a recognized and approved certificate.
CCI-000352
The information system prevents the installation of organization-defined critical software programs that are not signed with a certificate that is recognized and approved by the organization.
CCI-001747
The organization defines critical software components the information system will prevent from being installed without verification the component has been digitally signed using a certificate that is recognized and approved by the organization.
CCI-001748
The organization defines critical firmware components the information system will prevent from being installed without verification the component has been digitally signed using a certificate that is recognized and approved by the organization.
CCI-001749
The information system prevents the installation of organization-defined software components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
CCI-001750
The information system prevents the installation of organization-defined firmware components without verification the firmware component has been digitally signed using a certificate that is recognized and approved by the organization.
Linked STIG Checks (113)
Across 62 STIGs. Click to expand.
▶
Adobe ColdFusion Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
1 check
▶
Apple macOS 12 (Monterey) Security Technical Implementation Guide
1 check
▶
Apple macOS 13 (Ventura) Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
1 check
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
1 check
▶
Forescout Network Device Management Security Technical Implementation Guide
1 check
▶
Fortinet FortiGate Firewall NDM Security Technical Implementation Guide
1 check
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
IBM Hardware Management Console (HMC) STIG
1 check
▶
Microsoft Access 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Excel 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft Internet Explorer 11 Security Technical Implementation Guide
1 check
▶
Microsoft Office 365 ProPlus Security Technical Implementation Guide
9 checks
▶
Microsoft PowerPoint 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Project 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Publisher 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Visio 2016 Security Technical Implementation Guide
2 checks
▶
Microsoft Word 2016 Security Technical Implementation Guide
2 checks
▶
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
1 check
▶
Oracle Linux 7 Security Technical Implementation Guide
4 checks
▶
Oracle Linux 8 Security Technical Implementation Guide
4 checks
▶
Rancher Government Solutions RKE2 Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
4 checks
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
4 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
6 checks
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
1 check
▶
Solaris 11 SPARC Security Technical Implementation Guide
1 check
▶
Solaris 11 X86 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
1 check
▶
Tanium 7.0 Security Technical Implementation Guide
3 checks
▶
Tanium 7.3 Security Technical Implementation Guide
3 checks
▶
Tanium 7.x Application on TanOS Security Technical Implementation Guide
2 checks
▶
Tanium 7.x Security Technical Implementation Guide
3 checks
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
1 check
▶
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
2 checks
▶
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
2 checks
▶
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
2 checks
▶
VMware vRealize Automation 7.x vAMI Security Technical Implementation Guide
1 check
▶
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
1 check
▶
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 VAMI Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
3 checks
▶
VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation Guide
2 checks
▶
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
2 checks