CM · Plan wizard

Configuration Management Plan

Documents how the organization establishes, maintains, and monitors baseline configurations for the system. Covers the controls of the CM family in NIST SP 800-53 r5 and aligns with NIST SP 800-128.

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics §4 sub-section

Tools, baselines, and the change-request flow that everything else hangs off.

Tool, repo, or system holding your authoritative configuration baselines (e.g., GitHub Enterprise, Ansible Automation Platform, SCCM, Puppet Enterprise, Chef, Salt).
Where baseline configurations live and how they're versioned. Example: 'In a Git repository under config/baselines/, tagged at each release. Hardware inventory tracked in ServiceNow CMDB.'
Workflow from change request through review, approval, implementation, and verification. Mention tooling (Jira, ServiceNow), approval thresholds, and the emergency change pathway.
Configuration Control Board §4 sub-section

Membership, quorum, decision authority, and emergency-change criteria.

Role title (e.g., 'Director of Engineering') rather than a named individual; the role outlasts the person.
    Roles that hold votes. Example list: System Owner, ISSO, ISSM, Engineering Lead, Network Lead.
    Number or percentage of voting members required to make a binding decision (e.g., '4 of 6', 'simple majority').
    What changes require simple majority vs unanimous? What's the threshold for changes affecting the security posture?
    What qualifies as an emergency change? Who can authorize? What's the retroactive review window?
    What's recorded for each CCB meeting? Where are minutes stored? Retention?
    Configuration Item Identification §3 sub-section

    How CIs are named, classified, and related to each other.

    How CIs are named, e.g., '<env>-<role>-<serial>' or 'aws/<account>/<region>/<resource_id>'.
    How dependencies between CIs are documented (e.g., 'CMDB relationship table with hosts → applications → databases'). Critical for impact analysis.
    Branch / tag / release strategy used to track CI versions.
    Hardening sources §4 sub-section

    Authoritative configuration sources cited for CM-6 baseline composition.

      Suggested:
      Add each authoritative source. Suggestions auto-populate one click; you can edit or add custom entries.
      Configuration Audit Strategy §4 sub-section

      Functional vs physical audits, frequency, roles, and reconciliation.

      How often each audit type runs (e.g., 'FCA quarterly, PCA annually').
      Role responsible for independent verification (e.g., 'Internal Audit', 'Third-party assessor').
      What the System Owner provides / signs off during the audit.
      How discrepancies between audited configuration and the documented baseline are reconciled, who decides, and how it's tracked.
      Exception Management §4 sub-section

      Approval workflow, time-bound waivers, POA&M linkage, and revalidation.

      Who can request, who reviews, who approves a deviation from baseline. Reference CCB if relevant.
      Hard limit on how long a waiver can stand before it must be revisited (e.g., '90 days', '6 months').
      How active waivers are tracked in the POA&M (e.g., 'Each waiver opens a POA&M item with milestone = waiver expiration').
      How often open waivers are reviewed for continued applicability.
      Backup & Recoverability of Baselines §6 sub-section

      Recoverability, versioning, and integrity protection for configuration data (CM-9 / CP overlap).

      How baselines + supporting configuration data can be restored if lost or corrupted. RTO / RPO if defined.
      How successive baseline versions are tracked (Git tags, retention policy on snapshots, etc.).
      How baselines are protected from undetected modification (signed Git tags, SHA-256 hashes in CMDB, etc.).
      Drift Detection Automation §6 sub-section

      Tooling, frequency, alerting, and integration with SIEM / ticketing.

      What runs the periodic comparison (SCCM compliance baselines, Tenable, Ansible idempotent run, custom scripts, etc.).
      How often drift detection runs (e.g., 'continuous', 'daily', 'weekly').
      What level of drift triggers a page vs a daily summary. How false positives are tuned out.
      Where drift findings flow (SIEM rule, Jira queue, ServiceNow incident). Owner of triage.
      CM Metrics & KPIs §6 sub-section

      Metrics tracked to demonstrate CM control effectiveness over time.

        Suggested:
        Add each metric your program reports on. Suggestions are common picks; customize as needed.
        Configuration Documentation Control §4 sub-section

        Versioning schema, approval signatures, and retention requirements.

        Format used for plan / baseline document versions (e.g., 'MAJOR.MINOR.PATCH', '<year>.<release>').
        How long approved baseline documents and supporting records are retained (e.g., '7 years post-decommission', 'per NARA GRS 4.2').
        Cross-references to other RMF artifacts §7

        Where this plan plugs into the broader RMF package.

        Where in the SSP the CM control implementations are summarized (e.g., 'SSP §13.5').
        Convention used to identify CM-related POA&M items (e.g., 'CM-' or 'POAM-CM-####').
        Vulnerability scanner whose output drives CM remediation (e.g., 'Tenable.sc Container A', 'Nessus Manager').
        Pointer to the CA-7 monitoring strategy document that ties CM continuous-monitoring activities to the broader ConMon plan.
        4

        Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

        5