STIGhub
STIGs
RMF Controls
Compare
← All Controls
CM-7 (1)
Configuration Management
Rev 3
Least Functionality
CCI Identifiers (6)
CCI-000383
The organization defines the frequency of information system reviews to identify and eliminate unnecessary functions, ports, protocols and/or services.
CCI-000384
Review the system per organization-defined frequency to identify unnecessary and nonsecure functions, ports, protocols, software, and services.
CCI-000385
The organization reviews the information system per organization-defined frequency to eliminate unnecessary functions, ports, protocols, and/or services.
CCI-001760
Defines the frequency of system reviews to identify unnecessary and/or nonsecure functions, ports, protocols, software, and services.
CCI-001761
Defines the functions, ports, protocols, software, and services within the information system that are to be disabled or removed when deemed unnecessary and/or nonsecure.
CCI-001762
Disable or remove organization-defined functions, ports, protocols, software, and services within the system deemed to be unnecessary and/or nonsecure.
Linked STIG Checks (124)
Across 92 STIGs. Click to expand.
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 Windows Site Security Technical Implementation Guide
1 check
▶
ArcGIS for Server 10.3 Security Technical Implementation Guide
1 check
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
1 check
▶
CA IDMS Security Technical Implementation Guide
1 check
▶
Container Platform Security Requirements Guide
1 check
▶
Crunchy Data Postgres 16 Security Technical Implementation Guide
1 check
▶
Crunchy Data PostgreSQL Security Technical Implementation Guide
1 check
▶
Database Security Requirements Guide
1 check
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
2 checks
▶
Domain Name System (DNS) Security Requirements Guide
1 check
▶
Dragos Platform 2.x Security Technical Implementation Guide
1 check
▶
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
1 check
▶
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
1 check
▶
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
Google Android 14 COBO Security Technical Implementation Guide
1 check
▶
Google Android 14 COPE Security Technical Implementation Guide
1 check
▶
Google Android 15 COBO Security Technical Implementation Guide
1 check
▶
Google Android 15 COPE Security Technical Implementation Guide
1 check
▶
Google Android 16 COBO Security Technical Implementation Guide
1 check
▶
Google Android 16 COPE Security Technical Implementation Guide
1 check
▶
Google Chrome Current Windows Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COBO Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COPE Security Technical Implementation Guide
1 check
▶
Honeywell Android 9.x COBO Security Technical Implementation Guide
1 check
▶
Honeywell Android 9.x COPE Security Technical Implementation Guide
1 check
▶
IBM DB2 V10.5 LUW Security Technical Implementation Guide
1 check
▶
IBM Hardware Management Console (HMC) Security Technical Implementation Guide
1 check
▶
IBM Hardware Management Console (HMC) STIG
2 checks
▶
ISEC7 Sphere Security Technical Implementation Guide
3 checks
▶
Jamf Pro v10.x EMM Security Technical Implementation Guide
1 check
▶
MariaDB Enterprise 10.x Security Technical Implementation Guide
1 check
▶
MarkLogic Server v9 Security Technical Implementation Guide
1 check
▶
McAfee Application Control 7.x Security Technical Implementation Guide
1 check
▶
Microsoft Azure SQL Database Security Technical Implementation Guide
2 checks
▶
Microsoft Azure SQL Managed Instance Security Technical Implementation Guide
1 check
▶
Microsoft DotNet Framework 4.0 Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Edge Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft IIS 10.0 Server Security Technical Implementation Guide
2 checks
▶
Microsoft IIS 10.0 Site Security Technical Implementation Guide
1 check
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
1 check
▶
MongoDB Enterprise Advanced 7.x Security Technical Implementation Guide
1 check
▶
MongoDB Enterprise Advanced 8.x Security Technical Implementation Guide
1 check
▶
Motorola Solutions Android 13 COBO Security Technical Implementation Guide
1 check
▶
Motorola Solutions Android 13 COPE Security Technical Implementation Guide
1 check
▶
MS SQL Server 2014 Instance Security Technical Implementation Guide
1 check
▶
Oracle Database 19c Security Technical Implementation Guide
1 check
▶
Oracle MySQL 8.0 Security Technical Implementation Guide
1 check
▶
PostgreSQL 9.x Security Technical Implementation Guide
1 check
▶
Rancher Government Solutions RKE2 Security Technical Implementation Guide
1 check
▶
Redis Enterprise 6.x Security Technical Implementation Guide
1 check
▶
Samsung Android 16 COBO Security Technical Implementation Guide
1 check
▶
Samsung Android 16 COPE Security Technical Implementation Guide
1 check
▶
Samsung Android OS 13 with Knox 3.x COBO Security Technical Implementation Guide
1 check
▶
Samsung Android OS 13 with Knox 3.x COPE Security Technical Implementation Guide
1 check
▶
Samsung Android OS 14 with Knox 3.x COBO Security Technical Implementation Guide
1 check
▶
Samsung Android OS 14 with Knox 3.x COPE Security Technical Implementation Guide
1 check
▶
Samsung Android OS 15 with Knox 3.x COBO Security Technical Implementation Guide
1 check
▶
Samsung Android OS 15 with Knox 3.x COPE Security Technical Implementation Guide
1 check
▶
Tanium 7.0 Security Technical Implementation Guide
5 checks
▶
Tanium 7.3 Security Technical Implementation Guide
5 checks
▶
Tanium 7.x Application on TanOS Security Technical Implementation Guide
3 checks
▶
Tanium 7.x Security Technical Implementation Guide
5 checks
▶
Trellix Application Control 8.x Security Technical Implementation Guide
1 check
▶
Unified Endpoint Management Server Security Requirements Guide
1 check
▶
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
3 checks
▶
VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide
1 check
▶
VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
1 check
▶
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
3 checks
▶
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
3 checks
▶
VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
1 check
▶
VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 vCenter Appliance PostgreSQL Security Technical Implementation Guide
1 check
▶
Web Server Security Requirements Guide
1 check
▶
Zebra Android 11 COBO Security Technical Implementation Guide
1 check
▶
Zebra Technologies Android 14 COBO Security Technical Implementation Guide
1 check
▶
Zebra Technologies Android 14 COPE Security Technical Implementation Guide
1 check
▶
zOS WebSphere Application Server for ACF2 Security Technical Implementation Guide
2 checks
▶
zOS Websphere Application Server for RACF Security Technical Implementation Guide
2 checks
▶
zOS WebSphere Application Server for TSS Security Technical Implementation Guide
2 checks
▶
zOS WebSphere MQ for ACF2 Security Technical Implementation Guide
2 checks
▶
zOS WebSphere MQ for RACF Security Technical Implementation Guide
2 checks
▶
zOS WebSphere MQ for TSS Security Technical Implementation Guide
2 checks