Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-8System Component Inventory

Develop and document an inventory of system components that: Accurately reflects the system; Includes all components within the system; Does not include duplicate accounting of components or components assigned to any other system; Is at the level of granularity deemed necessary for tracking and reporting; and Includes the following information to achieve system component accountability: {{ insert: param, cm-08_odp.01 }} ; and Review and update the system component inventory {{ insert: param, cm-08_odp.02 }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (101)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-829Inclusion of Functionality from Untrusted Control Sphere254The inventory process requires identifying and recording the origin of all components, making inclusion of functionality from untrusted control spheres easier to detect during reviews.
CWE-506Embedded Malicious Code80Regular inventory reviews and updates make it harder to conceal or exploit embedded malicious code by requiring all components to be documented and accounted for.
CWE-912Hidden Functionality79Documenting every system component at the required granularity and reviewing the inventory detects or prevents hidden functionality from remaining undetected.
CWE-1104Use of Unmaintained Third Party Components19Maintaining an accurate, reviewed inventory of all system components enables tracking of third-party software versions and maintenance status, reducing the risk of using unmaintained components.
CWE-1242Inclusion of Undocumented Features or Chicken Bits14Requiring an inventory that accurately reflects the system forces documentation of all components, making inclusion of undocumented features or chicken bits harder to achieve without detection.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-156382.010.00.0002partial
CVE-2025-121042.09.80.0035partial
CVE-2026-412422.09.80.0006partial
CVE-2026-41762.09.80.0003partial
CVE-2026-33812.09.80.0003partial
CVE-2025-154442.09.80.0003partial
CVE-2026-339431.88.80.0007partial
CVE-2026-25881.89.10.0006partial
CVE-2026-236541.88.80.0005partial
CVE-2026-71111.78.40.0002partial
CVE-2025-17171.68.10.0017partial
CVE-2026-330551.68.10.0002partial
CVE-2026-315061.67.80.0001partial
CVE-2026-342261.57.50.0005partial
CVE-2026-420351.57.40.0008partial
CVE-2026-401751.04.80.0003partial

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-3 CM-4 CM-5 CM-6 CM-7 CM-9