An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
59/172
)
CCIs
Number
Definition
Status
Related
CCI-001771
The organization updates the list of unauthorized software programs per organization-defined frequency.
Deprecated
CM-7(4)
CCI-001772
Defines the software programs authorized to execute on the system.
Draft
CM-7(5)
CCI-001773
Identify the organization-defined software programs authorized to execute on the system.
Draft
CM-7(5)
CCI-001774
Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system.
Draft
CM-7(5)
CCI-001775
Defines the frequency on which the list of authorized software programs will be reviewed and updated.
Draft
CM-7(5)
CCI-001776
The organization defines the frequency on which it will update the list of authorized software programs.
Deprecated
CM-7(5)
CCI-001777
Review and update the list of authorized software programs per organization-defined frequency.
Draft
CM-7(5)
CCI-001778
The organization updates the list of authorized software programs per organization-defined frequency.
Deprecated
CM-7(5)
CCI-001779
Defines the frequency on which the system component inventory is to be reviewed and updated.
Draft
CM-8
CCI-001780
Review and update the system component inventory per organization-defined frequency.
Draft
CM-8
CCI-001781
The organization defines the frequency on which the information system component inventory is to be updated.
Deprecated
CM-8
CCI-001782
The organization updates the information system component inventory per organization-defined frequency.
Deprecated
CM-8
CCI-001783
Defines the personnel or roles to be notified when unauthorized hardware, software, and firmware components are detected within the system.
Draft
CM-8(3)
CCI-001784
When unauthorized hardware, software, and firmware components are detected within the system, the organization takes action to disable network access by such components, isolates the components, and/or notifies organization-defined personnel or roles.
Draft
CM-8(3)
CCI-001785
Provide a centralized repository for the inventory of system components.
Draft
CM-8(7)
CCI-001786
Support the tracking of system components by geographic location using organization-defined automated mechanisms.
Draft
CM-8(8)
CCI-001787
The organization defines the acquired information system components that are to be assigned to an information system.
Draft
CM-8(9)
CCI-001788
Assign system components to a system.
Draft
CM-8(9)
CCI-001789
Receive an acknowledgement from organization-defined personnel or roles of the acquired system components to a system.
Draft
CM-8(9)
CCI-001790
The organization develops a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
Draft
CM-9
CCI-001791
The organization documents a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
Draft
CM-9
CCI-001792
Implement a configuration management plan for the system that establishes a process for identifying configuration items throughout the system development life cycle.
Draft
CM-9
CCI-001793
The organization develops a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
Draft
CM-9
CCI-001794
The organization documents a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
Draft
CM-9
CCI-001795
Implement a configuration management plan for the system that establishes a process for managing the configuration of the configuration items.
Draft
CM-9
CCI-001796
The organization develops a configuration management plan for the information system that places the configuration items under configuration management.
Draft
CM-9
CCI-001797
The organization documents a configuration management plan for the information system that places the configuration items under configuration management.
Draft
CM-9
CCI-001798
Implement a configuration management plan for the system that places the configuration items under configuration management.
Draft
CM-9
CCI-001799
Develop and document a configuration management plan for the system that protects the configuration management plan from unauthorized disclosure and modification.
Draft
CM-9
CCI-001800
The organization documents a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
Deprecated
CM-9
Prev
1...
55
56
57
58
59
60
61
62
63
...172
Next