Course Overview
Master the processes for managing and securing system configurations to prevent unauthorized changes and maintain compliance with CMMC.
Inside the Course
19 Lessons
Configuration Management (CM)
CM.L2-3.4.1 System Baselining- Why Behind
CM.L2-3.4.1 System Baselining- Evidence
CM.L2-3.4.2 Security Configuration Enforcement- Evidence
CM.L2-3.4.2 Security Configuration Enforcement- Why Behind
CM.L2-3.4.3 System Change Management - Why Behind
CM.L2-3.4.3 System Change Management - Evidence
CM.L2-3.4.4 Security Impact Analysis - Why Behind
CM.L2-3.4.4 Security Impact Analysis - Evidence
CM.L2-3.4.5 Access Restrictions for Change - Why Behind
CM.L2-3.4.5 Access Restrictions for Change - Evidence
CM.L2-3.4.6 Least Functionality - Why Behind
CM.L2-3.4.6 Least Functionality - Evidence
CM.L2-3.4.7 Nonessential Functionality - Why Behind
CM.L2-3.4.7 Nonessential Functionality - Evidence
CM.L2-3.4.8 Application Execution Policy - Why Behind
CM.L2-3.4.8 Application Execution Policy - Evidence
CM.L2-3.4.9 User-Installed Software - Why Behind
CM.L2-3.4.9 User-Installed Software - Evidence