STIGhub
STIGs
RMF Controls
Compare
← All Controls
CM-7 (5)
Configuration Management
Rev 5
Least Functionality
CCI Identifiers (7)
CCI-001772
Defines the software programs authorized to execute on the system.
CCI-001773
Identify the organization-defined software programs authorized to execute on the system.
CCI-001774
Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system.
CCI-001775
Defines the frequency on which the list of authorized software programs will be reviewed and updated.
CCI-001776
The organization defines the frequency on which it will update the list of authorized software programs.
deprecated
CCI-001777
Review and update the list of authorized software programs per organization-defined frequency.
CCI-001778
The organization updates the list of authorized software programs per organization-defined frequency.
deprecated
Linked STIG Checks (125)
Across 44 STIGs. Click to expand.
▶
Apple macOS 12 (Monterey) Security Technical Implementation Guide
16 checks
▶
Apple macOS 13 (Ventura) Security Technical Implementation Guide
16 checks
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
1 check
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
2 checks
▶
Cloud Computing Mission Owner Operating System Security Requirements Guide
1 check
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
2 checks
▶
Container Platform Security Requirements Guide
1 check
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
3 checks
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
1 check
▶
IBM z/OS RACF Security Technical Implementation Guide
1 check
▶
IBM z/OS TSS Security Technical Implementation Guide
1 check
▶
McAfee Application Control 7.x Security Technical Implementation Guide
21 checks
▶
Microsoft Edge Security Technical Implementation Guide
1 check
▶
Microsoft Windows 10 Security Technical Implementation Guide
1 check
▶
Microsoft Windows 11 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2016 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2019 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2022 Security Technical Implementation Guide
1 check
▶
Microsoft Windows Server 2025 Security Technical Implementation Guide
1 check
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
1 check
▶
Nutanix Acropolis GPOS Security Technical Implementation Guide
1 check
▶
Oracle Linux 8 Security Technical Implementation Guide
3 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
2 checks
▶
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
3 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
2 checks
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
1 check
▶
Riverbed NetIM OS Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
1 check
▶
Tanium 7.3 Security Technical Implementation Guide
1 check
▶
Tanium 7.x Security Technical Implementation Guide
1 check
▶
Trellix Application Control 8.x Security Technical Implementation Guide
20 checks
▶
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
1 check
▶
Virtual Machine Manager Security Requirements Guide
1 check
▶
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
1 check
▶
VMware vSphere 8.0 ESXi Security Technical Implementation Guide
1 check
▶
Windows Server 2016 Security Technical Implementation Guide
2 checks
▶
Windows Server 2019 Security Technical Implementation Guide
1 check