Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-7Least Functionality

Configure the system to provide only {{ insert: param, cm-07_odp.01 }} ; and Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: {{ insert: param, cm-7_prm_2 }}.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (3)

ATT&CK techniques this control mitigates (223)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-284Improper Access Control4,905Restricting available functions and services reduces the attack surface and enforces proper access control boundaries.
CWE-306Missing Authentication for Critical Function2,600Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.
CWE-732Incorrect Permission Assignment for Critical Resource1,837Configuring systems to provide only required functionality avoids incorrect permission assignments on unneeded resources, ports, or services.
CWE-285Improper Authorization1,252By limiting enabled features to only those needed, the control strengthens authorization by removing opportunities for unauthorized use of excess functionality.
CWE-250Execution with Unnecessary Privileges311Prohibiting unnecessary functions, ports, protocols, software, and services directly prevents execution with privileges beyond what is required for the system's purpose.
CWE-1188Initialization of a Resource with an Insecure Default309Requiring explicit configuration to minimal functionality overrides insecure defaults that would otherwise enable excess capabilities.
CWE-749Exposed Dangerous Method or Function158Explicitly prohibiting dangerous or unnecessary functions and services prevents exposure of methods that could be directly exploited.
CWE-272Least Privilege Violation26Enforcing only the minimal set of functionality implements least privilege by eliminating unneeded capabilities that could be abused.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-278162.09.80.0031good
CVE-2026-237512.09.80.0025good
CVE-2025-439862.09.80.0012good
CVE-2025-520892.08.80.0320good
CVE-2025-428781.68.20.0010good
CVE-2026-349901.67.80.0001good
CVE-2025-417561.68.10.0005good
CVE-2025-621881.57.50.0003good
CVE-2024-40891 KEV7.08.80.5324good
CVE-2026-279664.29.80.3739good
CVE-2025-22226 KEV3.77.10.0432partial
CVE-2025-547823.78.80.3248good
CVE-2026-38442.89.80.1466good
CVE-2026-218772.69.90.1074good
CVE-2025-213072.69.80.1077partial
CVE-2026-330572.59.80.0842good
CVE-2025-412432.410.00.0642good
CVE-2025-531452.48.80.1108good
CVE-2025-531442.48.80.1108good
CVE-2025-14972.39.80.0557good
CVE-2025-545742.29.30.0499good
CVE-2025-666312.19.80.0282good
CVE-2025-72062.19.80.0295good
CVE-2025-67042.19.80.0158good
CVE-2026-35872.010.00.0013good

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-3 CM-4 CM-5 CM-6 CM-8 CM-9