Content library
NIST CSF 2.0
PR.PS-01: Configuration management

Requirement description

PR.PS-01: Configuration management practices are established and applied.

How to fill the requirement

NIST CSF 2.0

PR.PS-01: Configuration management

Task name
Priority
Status
Theme
Policy
Other requirements
Baseline configuration for systems
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
3
requirements

Examples of other requirements this task affects

PR.IP-1: A baseline configuration of information technology systems
NIST
PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles.
CyberFundamentals
PR.PS-01: Configuration management
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
Baseline configuration for systems
1. Task description

The organization has maintained a basic configuration requirement for IT systems and industrial control systems that takes into account security principles, such as the concept of least functionality.

Configuration management and change log
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
12
requirements

Examples of other requirements this task affects

8.9: Configuration management
ISO 27001
CC7.1: Procedures for monitoring changes to configurations
SOC 2
1.2.4: Definition of responsibilities with service providers
TISAX
PR.IP-3: Configuration change control processes are in place.
CyberFundamentals
DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Configuration management and change log
1. Task description

Current configurations of devices, data systems and networks are documented and a log is maintained of configuration changes.

Changes to configurations must be controlled and go through the change management procedure. Only authorized personnel are allowed to make changes to the configurations.

Configuration information may include e.g.:

  • property owner and contact point information
  • date of last configuration change
  • configuration model version
  • connections to other assets
Monitoring configurations
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
10
requirements

Examples of other requirements this task affects

8.9: Configuration management
ISO 27001
1.2.4: Definition of responsibilities with service providers
TISAX
DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed.
CyberFundamentals
2.5.1: Control data flow between network zones
NSM ICT-SP
2.3.5: Verify that activated security configurations comply with the organisation’s approved security configurations
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Monitoring configurations
1. Task description

Configurations should be monitored with comprehensive system management tools (e.g. maintenance utilities, remote support, enterprise management tools, backup and recovery software) and reviewed regularly to assess settings, password strengths, and operations performed. Actual configurations can be compared to defined target models. Any discrepancies must be dealt with either automatically or by manual processing.

Any unauthorized changes must be corrected and cause investigated and reported.

Tasks included in the policy

Task name
Priority
Status
Theme
Policy
Other requirements
No items found.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.