U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

configuration control

Definition(s):

  Process for controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-128 from CNSSI 4009-2015
NIST SP 800-37 Rev. 2
NIST SP 800-128 under Configuration Control from CNSSI 4009
NIST SP 800-37 Rev. 1 under Configuration Control from CNSSI 4009
NIST SP 800-53 Rev. 4 under Configuration Control from CNSSI 4009
NIST SP 800-137 under Configuration Control (or Configuration Management) from CNSSI 4009

  Process for controlling modifications to hardware, firmware, software, and documentation to ensure that the information system is protected against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-18 Rev. 1 under Configuration Control from CNSSI 4009

  Process for controlling modifications to hardware, firmware, software, and documentation to ensure the information system is protected against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-82 Rev. 2 under Configuration Control from CNSSI 4009

  Process of controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications prior to, during, and after system implementation.
Source(s):
CNSSI 4009-2015 from NIST SP 800-37 Rev. 1

  Process for controlling modifications to hardware, firmware, software, and documentation to protect the system against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-53 Rev. 5 from NIST SP 800-128