Skip to content

Configuration Management

Configuration Management is about knowing and controlling your environment. What systems do you have? Are they configured securely? Who can change them? What software is allowed to run?

Baselines & Inventory (3.4.1–3.4.2) — Document what a properly configured system looks like and maintain a current inventory of every piece of hardware and software. Harden everything to security benchmarks.

Change Control (3.4.3–3.4.5) — Every change goes through documented approval. Analyze security impact before implementing. Restrict who can make changes to production.

Attack Surface (3.4.6–3.4.9) — Disable unnecessary features, block unnecessary ports and protocols, control which software can execute, and prevent unauthorized installations.


RefShort NameWhat It Covers
3.4.1Know Your InventoryBaseline configs and asset inventory
3.4.2Harden EverythingSecurity baselines applied and enforced
3.4.3Control Every ChangeTrack, review, approve, and log every change
3.4.4Check Before You ChangeSecurity impact analysis before implementation
3.4.5Lock Down Change AccessOnly authorized personnel make changes
3.4.6Shrink the Attack SurfaceOnly essential capabilities enabled
3.4.7Block What’s Not NeededActively prevent nonessential programs, ports, protocols
3.4.8Whitelist or Blacklist SoftwareApplication control — approved software only
3.4.9No Unauthorized SoftwareControl and monitor user-installed software