Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family CM

CM-8System Component Inventory

Develop and document an inventory of system components that: Accurately reflects the system; Includes all components within the system; Does not include duplicate accounting of components or components assigned to any other system; Is at the level of granularity deemed necessary for tracking and reporting; and Includes the following information to achieve system component accountability: {{ insert: param, cm-08_odp.01 }} ; and Review and update the system component inventory {{ insert: param, cm-08_odp.02 }}.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (2)

ATT&CK techniques this control mitigates (101)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-829Inclusion of Functionality from Untrusted Control Sphere259The inventory process requires identifying and recording the origin of all components, making inclusion of functionality from untrusted control spheres easier to detect during reviews.
CWE-506Embedded Malicious Code83Regular inventory reviews and updates make it harder to conceal or exploit embedded malicious code by requiring all components to be documented and accounted for.
CWE-912Hidden Functionality79Documenting every system component at the required granularity and reviewing the inventory detects or prevents hidden functionality from remaining undetected.
CWE-1104Use of Unmaintained Third Party Components20Maintaining an accurate, reviewed inventory of all system components enables tracking of third-party software versions and maintenance status, reducing the risk of using unmaintained components.
CWE-1242Inclusion of Undocumented Features or Chicken Bits14Requiring an inventory that accurately reflects the system forces documentation of all components, making inclusion of undocumented features or chicken bits harder to achieve without detection.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-156382.010.00.0002partial
CVE-2025-121042.09.80.0035partial
CVE-2026-412422.09.80.0006partial
CVE-2026-4176 UPD2.09.80.0003partial
CVE-2026-33812.09.80.0004partial
CVE-2025-154442.09.80.0003partial
CVE-2026-339431.88.80.0007partial
CVE-2026-25881.89.10.0006partial
CVE-2026-236541.88.80.0006partial
CVE-2026-7111 UPD1.78.40.0002partial
CVE-2025-17171.68.10.0017partial
CVE-2026-330551.68.10.0002partial
CVE-2026-315061.67.80.0001partial
CVE-2026-342261.57.50.0005partial
CVE-2026-420351.57.40.0011partial
CVE-2026-09431.57.50.0014partial
CVE-2026-40175 UPD1.04.80.0003partial

Other controls in family CM

CM-1 CM-10 CM-11 CM-12 CM-13 CM-14 CM-2 CM-3 CM-4 CM-5 CM-6 CM-7 CM-9