Process for controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-128
from
CNSSI 4009-2015
NIST SP 800-37 Rev. 2
NIST SP 800-128
under Configuration Control
from
CNSSI 4009
NIST SP 800-37 Rev. 1
under Configuration Control
from
CNSSI 4009
NIST SP 800-53 Rev. 4
under Configuration Control
from
CNSSI 4009
NIST SP 800-137
under Configuration Control (or Configuration Management)
from
CNSSI 4009
Process for controlling modifications to hardware, firmware, software, and documentation to ensure that the information system is protected against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-18 Rev. 1
under Configuration Control
from
CNSSI 4009
Process for controlling modifications to hardware, firmware, software, and documentation to ensure the information system is protected against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-82 Rev. 2
under Configuration Control
from
CNSSI 4009
Process of controlling modifications to hardware, firmware, software, and documentation to protect the information system against improper modifications prior to, during, and after system implementation.
Source(s):
CNSSI 4009-2015
from
NIST SP 800-37 Rev. 1
Process for controlling modifications to hardware, firmware, software, and documentation to protect the system against improper modifications before, during, and after system implementation.
Source(s):
NIST SP 800-53 Rev. 5
from
NIST SP 800-128