IBM Cloud Docs
CM-7 (1) - Periodic Review

CM-7 (1) - Periodic Review

Control requirements

The organization:

CM-7 (1) (a)
Reviews the information system [IBM Assignment: at least monthly] to identify unnecessary and/or nonsecure functions, ports, protocols, and services; and
CM-7 (1) (b)
Disables [Assignment: organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and/or nonsecure].

NIST supplemental guidance

The organization can either make a determination of the relative security of the function, port, protocol, and/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.