STIGhub
STIGs
RMF Controls
Compare
← All Controls
CM-7 (2)
Configuration Management
Rev 3
Least Functionality
CCI Identifiers (9)
CCI-000386
The organization employs automated mechanisms to prevent program execution on the information system in accordance with the organization-defined specifications.
CCI-001590
The organization develops a list of software programs authorized to execute on the information system.
deprecated
CCI-001591
The organization develops a list of software programs not authorized to execute on the information system.
deprecated
CCI-001592
Defines the rules authorizing the terms and conditions of software program usage on the system.
CCI-001593
The organization maintains a list of software programs authorized to execute on the information system.
deprecated
CCI-001594
The organization maintains a list of software programs not authorized to execute on the information system.
deprecated
CCI-001595
The organization maintains rules authorizing the terms and conditions of software program usage on the information system.
CCI-001763
Defines the policies regarding software program usage and restrictions.
CCI-001764
Prevent program execution in accordance with organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions; rules authorizing the terms and conditions of software program usage.
Linked STIG Checks (200)
Across 50 STIGs. Click to expand.
▶
Amazon Linux 2023 Security Technical Implementation Guide
3 checks
▶
Anduril NixOS Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
2 checks
▶
Cloud Computing Mission Owner Operating System Security Requirements Guide
3 checks
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
21 checks
▶
Container Platform Security Requirements Guide
1 check
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
2 checks
▶
Dragos Platform 2.x Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
1 check
▶
Google Android 13 BYOAD Security Technical Implementation Guide
1 check
▶
Google Android 13 COPE Security Technical Implementation Guide
1 check
▶
Google Android 14 COBO Security Technical Implementation Guide
1 check
▶
Google Android 14 COPE Security Technical Implementation Guide
1 check
▶
Google Android 14 MDFPP 3.3 BYOAD Security Technical Implementation Guide
1 check
▶
Google Android 15 COBO Security Technical Implementation Guide
1 check
▶
Google Android 15 COPE Security Technical Implementation Guide
1 check
▶
Google Android 16 COBO Security Technical Implementation Guide
1 check
▶
Google Android 16 COPE Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COBO Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COPE Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
IBM z/OS ACF2 Security Technical Implementation Guide
5 checks
▶
IBM z/OS RACF Security Technical Implementation Guide
3 checks
▶
IBM z/OS TSS Security Technical Implementation Guide
4 checks
▶
Microsoft Windows 10 Security Technical Implementation Guide
3 checks
▶
Microsoft Windows 11 Security Technical Implementation Guide
3 checks
▶
Microsoft Windows Server 2016 Security Technical Implementation Guide
3 checks
▶
Microsoft Windows Server 2019 Security Technical Implementation Guide
3 checks
▶
Microsoft Windows Server 2022 Security Technical Implementation Guide
3 checks
▶
Microsoft Windows Server 2025 Security Technical Implementation Guide
3 checks
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
1 check
▶
Motorola Solutions Android 13 COBO Security Technical Implementation Guide
1 check
▶
Motorola Solutions Android 13 COPE Security Technical Implementation Guide
1 check
▶
Nutanix Acropolis GPOS Security Technical Implementation Guide
8 checks
▶
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
1 check
▶
Oracle Linux 7 Security Technical Implementation Guide
1 check
▶
Oracle Linux 8 Security Technical Implementation Guide
18 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
24 checks
▶
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide
4 checks
▶
Rancher Government Solutions Multi-Cluster Manager Security Technical Implementation Guide
1 check
▶
Rancher Government Solutions RKE2 Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
24 checks
▶
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
18 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
13 checks