NIST 800-53 REV 5 • CONFIGURATION MANAGEMENT

CM-6(3)Unauthorized Change Detection

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

This enhancement was incorporated into SI-7. It previously focused on detecting unauthorized changes to configuration settings.

Example 1: Deploy Tripwire or AIDE to monitor critical configuration files (like /etc/passwd, registry hives, or firewall rules) and alert on any unauthorized changes.

Example 2: Use AWS Config or Azure Policy compliance dashboards to continuously monitor for configuration drift from your approved settings.