Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-3Configuration Change Control

Determine and document the types of changes to the system that are configuration-controlled; Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses; Document configuration change decisions associated with the system; Implement approved configuration-controlled changes to the system; Retain records of configuration-controlled changes to the system for {{ insert: param, cm-03_odp.01 }}; Monitor and review activities associated with configuration-controlled changes to the system; and Coordinate and provide oversight for configuration change control activities through {{ insert: param, cm-03_odp.02 }} that convenes {{ insert: param, cm-03_odp.03 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (35)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Enforces access controls and oversight on who can propose, approve, or implement configuration modifications.
CWE-269Improper Privilege Management2,907Manages privileges for change control activities and provides oversight to prevent improper privilege use in configuration updates.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Controls changes to critical resources, helping maintain correct permission assignments and preventing insecure modifications.
CWE-285Improper Authorization1,230Mandates explicit authorization and approval for configuration-controlled changes with security considerations.
CWE-15External Control of System or Configuration Setting59Requires approval, documentation, and security impact review of all configuration changes, directly preventing unauthorized external control of system settings.
CWE-642External Control of Critical State Data18Monitors, approves, and documents changes to critical configuration state data, mitigating external control risks.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2026-403131.89.10.0004partial
CVE-2025-545941.89.10.0011good
CVE-2024-468811.47.10.0003good
CVE-2026-228692.09.80.0015good
CVE-2025-252702.09.80.0113good
CVE-2026-399581.89.10.0006partial
CVE-2026-308981.88.80.0008partial
CVE-2025-417171.88.80.0005partial
CVE-2026-233911.67.80.0002partial
CVE-2026-315481.67.80.0001partial
CVE-2026-323031.57.60.0002partial
CVE-2024-506961.57.50.0016partial
CVE-2025-13410.73.70.0006partial

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-4 CM-5 CM-6 CM-7 CM-8 CM-9