Skip Top Navigation
  • Who We Are

    • Leadership
    • Financials
    • Government Relations
    • Judicial Officer
    • Legal
    • Our History
    • Postal Facts
  • What We're Doing

    • Strategic Planning
    • Current Initiatives
    • Securing The Mail
    • Sustainability
    • Corporate Social Responsibility
    • Government Services
    • Postal Customer Council
    • Service Performance Results
  • Newsroom

    • National News
    • Local News
    • Testimony & Speeches
    • Broadcast Downloads
    • Events Calendar
    • Photo Gallery
    • Service Alerts
  • Careers

    • Career Opportunities
    • Working at USPS
    • How to Apply
    • Profile Login
  • Doing Business with Us

    • Suppliers
    • Licensing
    • Rights & Permissions
    • Auctions
    • Public Key Infrastructure
The image is the profile of an eagle's head adjoining the words United States Postal Service to form the corporate signature, along with the text About
Link to "2-4 Audit and Accountability" Link to contents for "2 Security Requirements"      Link to "2-6 Identification and Authentication"

2-5 Configuration Management

Configuration management guidelines are as follows:

  1. Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the system development life cycle.
  2. Establish and enforce security configuration settings for IT products employed in organizational systems.
  3. Track, review, approve/disapprove, and audit changes to organizational systems.
  4. Analyze the security impact of changes prior to implementation.
  5. Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.
  6. Employ the principle of least privilege by configuring organizational systems to provide only essential capabilities.
  7. Restrict, disable, and prevent the use of nonessential functions, ports, protocols, and services.
  8. Apply deny-by-exception (block) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (allow) policy to allow the execution of authorized software.
  9. Control and monitor user-installed software.



Link to "2-4 Audit and Accountability" Link to contents for "2 Security Requirements"      Link to "2-6 Identification and Authentication"
  • LEGAL

    • Privacy Policy ›
    • Terms of Use ›
    • FOIA ›
    • No FEAR Act EEO Data ›
  • ON ABOUT.USPS.COM

    • Newsroom ›
    • USPS Service Alerts ›
    • Forms & Publications ›
    • Careers ›
    • Site Index ›
  • ON USPS.COM

    • USPS.com Home ›
    • Buy Stamps & Shop ›
    • Print a Label with Postage ›
    • Customer Service ›
    • Delivering Solutions to the Last Mile ›
  • OTHER USPS SITES

    • Business Customer Gateway ›
    • Postal Inspectors ›
    • Inspector General ›
    • Postal Explorer ›
Copyright© 2025 USPS. All Rights Reserved.