CM-7(1)
CM-7(1): Periodic Review
The organization:
- (a): Reviews the information system [one of ] to identify unnecessary and/or nonsecure functions, ports, protocols, and services; and
- (b): Disables [one of ].
Supplemental
The organization can either make a determination of the relative security of the function, port, protocol, and/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |