Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-7Least Functionality

Configure the system to provide only {{ insert: param, cm-07_odp.01 }} ; and Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: {{ insert: param, cm-7_prm_2 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (223)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,832Restricting available functions and services reduces the attack surface and enforces proper access control boundaries.
CWE-306Missing Authentication for Critical Function2,567Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.
CWE-732Incorrect Permission Assignment for Critical Resource1,824Configuring systems to provide only required functionality avoids incorrect permission assignments on unneeded resources, ports, or services.
CWE-285Improper Authorization1,230By limiting enabled features to only those needed, the control strengthens authorization by removing opportunities for unauthorized use of excess functionality.
CWE-250Execution with Unnecessary Privileges305Prohibiting unnecessary functions, ports, protocols, software, and services directly prevents execution with privileges beyond what is required for the system's purpose.
CWE-1188Initialization of a Resource with an Insecure Default300Requiring explicit configuration to minimal functionality overrides insecure defaults that would otherwise enable excess capabilities.
CWE-749Exposed Dangerous Method or Function153Explicitly prohibiting dangerous or unnecessary functions and services prevents exposure of methods that could be directly exploited.
CWE-272Least Privilege Violation25Enforcing only the minimal set of functionality implements least privilege by eliminating unneeded capabilities that could be abused.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-278162.09.80.0031good
CVE-2026-237512.09.80.0019good
CVE-2025-439862.09.80.0011good
CVE-2025-520892.08.80.0320good
CVE-2025-428781.68.20.0008good
CVE-2026-349901.67.80.0001good
CVE-2025-417561.68.10.0004good
CVE-2025-621881.57.50.0002good
CVE-2024-40891 KEV7.08.80.5324good
CVE-2026-279664.29.80.3658good
CVE-2025-22226 KEV3.77.10.0432partial
CVE-2025-547823.78.80.3248good
CVE-2026-218772.89.90.1414good
CVE-2026-38442.79.80.1313good
CVE-2025-213072.69.80.1077partial
CVE-2026-330572.59.80.0842good
CVE-2025-412432.410.00.0726good
CVE-2025-14972.39.80.0557good
CVE-2025-531452.38.80.0867good
CVE-2025-531442.38.80.0867good
CVE-2025-468172.27.00.1320good
CVE-2025-666312.19.80.0192good
CVE-2025-72062.19.80.0295good
CVE-2025-545742.19.30.0390good
CVE-2026-35872.010.00.0013good

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-3 CM-4 CM-5 CM-6 CM-8 CM-9