PR.PS-01:

Configuration management practices are established and applied

Implementation Examples

Ex1:

Establish, test, deploy, and maintain hardened baselines that enforce the organization's cybersecurity policies and provide only essential capabilities (i.e., principle of least functionality)

Ex2:

Review all default configuration settings that may potentially impact cybersecurity when installing or upgrading software

Ex3:

Monitor implemented software for deviations from approved baselines