manage.get.gov/docs/compliance/dist/system-security-plans/ato/cm-2.7.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

2.4 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

cm-2.7 - [catalog] Configure Systems and Components for High-risk Areas

Control Statement

  • [a] Issue systems or system components with configurations to individuals traveling to locations that the organization deems to be of significant risk; and

  • [b] Apply the following controls to the systems or components when the individuals return from travel: controls.

Control guidance

When it is known that systems or system components will be in high-risk areas external to the organization, additional controls may be implemented to counter the increased threat in such areas. For example, organizations can take actions for notebook computers used by individuals departing on and returning from travel. Actions include determining the locations that are of concern, defining the required configurations for the components, ensuring that components are configured as intended before travel is initiated, and applying controls to the components after travel is completed. Specially configured notebook computers include computers with sanitized hard drives, limited applications, and more stringent configuration settings. Controls applied to mobile devices upon return from travel include examining the mobile device for signs of physical tampering and purging and reimaging disk drives. Protecting information that resides on mobile devices is addressed in the MP (Media Protection) family.

Control assessment-objective

systems or system components with configurations are issued to individuals traveling to locations that the organization deems to be of significant risk; controls are applied to the systems or system components when the individuals return from travel.


What is the solution and how is it implemented?


Implementation (a)

Add control implementation description here for item cm-2.7_smt.a


Implementation (b)

Add control implementation description here for item cm-2.7_smt.b