CM-7 Least Functionality
Last Review: 10/1/22
Statement
West Texas A&M University must configure the information systems to provide only essential capabilities and specifically prohibit or restrict the use of functions, ports, protocols, and/or services.
Applicability
This control applies to all West Texas A&M network information resources. The intended audience for this control includes all information resource owners and custodians.
Implementation
The information resource owner, or designee shall configure the information resource to provide only essential capabilities (i.e. restricting the use of unnecessary ports, protocols, or services). WTAMU information systems that are not hosted by a cloud provider, must be protected by IT managed firewalls, configuration management, and antivirus software.