SEARCH RESULTS


US-CERT – Risk Management Resource Guide     3.4 3.4.1 3.4.3 3.4.4 3.4.5 Configuration Management

https://www.cisa.gov/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-RM.pdf

This guide was created to assist individuals responsible for managing risk management programs for IT operations, including executives who establish policies and priorities for risk management, managers and planners who are responsible for converting executive decisions into action plans, and operations staff who implement those operational risk management plans.

Wright Brained – CMMC Practice 3.4.7 – Ports, Protocols, Programs Functions, and Services     3.4 3.4.7 Configuration Management

https://wrightbrainedsecurity.com/cmmc-practice-3-4-7-ports-protocols-programs-functions-and-services/

Most companies don’t struggle with implementing this practice—they struggle with the documentation. When it’s time to show evidence, things can get messy. You need to define exactly what’s “essential” and “nonessential” and provide proof that you’ve applied these definitions consistently across your systems.