Joint task force transformation initiative


CM-9 CONFIGURATION MANAGEMENT PLAN



Yüklə 5,64 Mb.
səhifə78/186
tarix08.01.2019
ölçüsü5,64 Mb.
#93199
1   ...   74   75   76   77   78   79   80   81   ...   186



CM-9 CONFIGURATION MANAGEMENT PLAN


Control: The organization develops, documents, and implements a configuration management plan for the information system that:

  1. Addresses roles, responsibilities, and configuration management processes and procedures;

  2. Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;

  3. Defines the configuration items for the information system and places the configuration items under configuration management; and

  4. Protects the configuration management plan from unauthorized disclosure and modification.

Supplemental Guidance: Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual information systems. Such plans define detailed processes and procedures for how configuration management is used to support system development life cycle activities at the information system level. Configuration management plans are typically developed during the development/acquisition phase of the system development life cycle. The plans describe how to move changes through change management processes, how to update configuration settings and baselines, how to maintain information system component inventories, how to control development, test, and operational environments, and how to develop, release, and update key documents. Organizations can employ templates to help ensure consistent and timely development and implementation of configuration management plans. Such templates can represent a master configuration management plan for the organization at large with subsets of the plan implemented on a system by system basis. Configuration management approval processes include designation of key management stakeholders responsible for reviewing and approving proposed changes to information systems, and personnel that conduct security impact analyses prior to the implementation of changes to the systems. Configuration items are the information system items (hardware, software, firmware, and documentation) to be configuration-managed. As information systems continue through the system development life cycle, new configuration items may be identified and some existing configuration items may no longer need to be under configuration control. Related controls: CM-2, CM-3, CM-4, CM-5, CM-8, SA-10.

Control Enhancements:

  1. configuration management plan | assignment of responsibility

The organization assigns responsibility for developing the configuration management process to organizational personnel that are not directly involved in information system development.

Supplemental Guidance: In the absence of dedicated configuration management teams assigned within organizations, system developers may be tasked to develop configuration management processes using personnel who are not directly involved in system development or integration. This separation of duties ensures that organizations establish and maintain a sufficient degree of independence between the information system development and integration processes and configuration management processes to facilitate quality control and more effective oversight.

References: NIST Special Publication 800-128.

Priority and Baseline Allocation:

P1

LOW Not Selected

MOD CM-9

HIGH CM-9



CM-10 SOFTWARE USAGE RESTRICTIONS


Control: The organization:

  1. Uses software and associated documentation in accordance with contract agreements and copyright laws;

  2. Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and

  3. Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.

Supplemental Guidance: Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs. Related controls: AC-17, CM-8, SC-7.

Control Enhancements:

  1. software usage restrictions | open source software

The organization establishes the following restrictions on the use of open source software: [Assignment: organization-defined restrictions].

Supplemental Guidance: Open source software refers to software that is available in source code form. Certain software rights normally reserved for copyright holders are routinely provided under software license agreements that permit individuals to study, change, and improve the software. From a security perspective, the major advantage of open source software is that it provides organizations with the ability to examine the source code. However, there are also various licensing issues associated with open source software including, for example, the constraints on derivative use of such software.

References: None.

Priority and Baseline Allocation:

Yüklə 5,64 Mb.

Dostları ilə paylaş:
1   ...   74   75   76   77   78   79   80   81   ...   186




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin