3.4 — Configuration Management

Configuration Management (CM) Policy

Establishes and maintains baseline configurations and inventories for OCSI systems — covering 9 controls per NIST SP 800-171 Rev 2.

Family: 3.4 — CMControls: 9Owner: Kit E. Floyd, Jr.Last Review: April 3, 2026
SELF-ASSESSMENT

Control statuses below reflect an internal self-assessment prepared with AI assistance. Statuses marked "Implemented" may be organizational claims without verifiable evidence. See POA&M for known gaps.

Policy Statement

OCSI shall establish and maintain baseline configurations and inventories of organizational systems throughout the respective system development life cycles. Configuration changes shall be controlled, tracked, and reviewed.

Control Implementation
ControlRequirementImplementationStatus
3.4.1Establish and maintain baseline configurations and inventories of organizational systemsSystem baseline documented: HTML5/CSS3/Vanilla JS web application hosted on GoDaddy. Asset inventory maintained including all deployed files, CDN dependencies (Google Fonts, FontAwesome), and server configuration. Implemented
3.4.2Establish and enforce security configuration settings for IT productsSecurity configurations enforced via: .htaccess security headers, CSP meta tags, X-Frame-Options DENY, X-Content-Type-Options nosniff, strict Referrer-Policy, and Permissions-Policy restrictions. Implemented
3.4.3Track, review, approve, or disapprove, and log changes to organizational systemsPARTIAL. Deployment script (deploy-godaddy.cjs) tracks files uploaded. However, no formal change management process exists — no approval workflow, no pre-deployment security review, and audit logging of deployments is not centralized. Partial
3.4.4Analyze the security impact of changes prior to implementationNOT IMPLEMENTED. No formal security impact analysis process exists. No external MSSP has been engaged for change reviews. Code changes are not security-reviewed before deployment. Not Implemented
3.4.5Define, document, approve, and enforce physical and logical access restrictions associated with changesFTP deployment credentials restricted to authorized personnel only. Deployment requires explicit .env configuration. Public access to CUI-containing systems requires authentication. Implemented
3.4.6Employ the principle of least functionality by configuring systems to provide only essential capabilitiesWeb application serves only required functionality: public marketing site + authenticated Command Center. No unnecessary services, debug endpoints, or admin panels exposed. .htaccess restricts directory browsing. Implemented
3.4.7Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and servicesApplication uses only HTTPS (port 443). No server-side scripting engines exposed. External resource loading restricted via CSP. Permissions-Policy disables camera, microphone, and geolocation APIs. Implemented
3.4.8Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized softwareCSP enforces allowlist for scripts, styles, and fonts. Only explicitly permitted CDN sources (Google Fonts, FontAwesome) allowed. All other external sources blocked by default. Implemented
3.4.9Control and monitor user-installed softwareWeb application does not allow user-installed software or extensions. All functionality is server-delivered. Browser extension impact mitigated by CSP restrictions. Implemented
System Inventory
ComponentVersion/DetailPurpose
Web ServerApache (GoDaddy Shared Hosting)Production hosting
ApplicationHTML5 / CSS3 / Vanilla JSWebsite + Command Center
Google FontsInter, Plus Jakarta SansTypography (styling only)
FontAwesome6.5.1 (CDN)Icons (styling only)
DeploymentNode.js FTP (basic-ftp)Secure file transfer
Review Schedule: Baseline configuration reviewed semi-annually. Asset inventory updated with each deployment.