Family 3.4 9 requirements
Configuration Management.
Known-good baselines. Disciplined change.
The big picture
Drift kills you in CMMC. Document what 'good' looks like, then enforce it — every change tracked, every deviation explained.
Theme 1
Baseline configs.
3.4.1 — 3.4.2Establishing a known-good configuration and enforcing security settings on every system.
Theme 2
Change control.
3.4.3 — 3.4.5Tracking changes, analysing security impact, and limiting who can make them.
- 3.4.3 Control Every Change. Every change to CUI systems goes through a documented process: request, review, approve, implement, log. 3.4.4 Check Before You Change. Assess the security impact of every change before implementing it. 3.4.5 Lock Down Change Access. Only authorized people can make physical and logical changes to CUI systems — documented and technically enforced.
Theme 3
Software and ports.
3.4.6 — 3.4.9Least functionality, restricted services, allowlisted software, and user-installed software control.
- 3.4.6 Shrink the Attack Surface. Configure systems to provide only essential capabilities. Disable everything else. 3.4.7 Block What's Not Needed. Actively restrict, disable, or prevent nonessential programs, functions, ports, protocols, and services. 3.4.8 Whitelist or Blacklist Software. Application control on CUI systems — decide which software is authorized and enforce it technically. 3.4.9 No Unauthorized Software. Control and monitor user-installed software. Users can't install without approval.