Skip Navigation Links
MenuExpand
ASSIST
   Data updated: 18 Jun 2024. Home |  About Quick Search |  ASSIST |  ASSIST Updates Document Details

Document ID:   DI-SESS-81343       Scroll down to access document images

Overview
Title:  Information Security (INFOSEC) Boundary Configuration Management Plan
Scope:  The INFOSEC Boundary (IB) Configuration Management (CM) Plan details the IB configuration control process, configuration management procedures, and review and approval procedures for changes to the security design implementation of the IB. It addresses hardware, firmware, software, testing and documentation at the various levels of trust. The IB CM Plan indicates how the security requirements baseline will be maintained during the operational life of the IB and provides assurance that the security protections are safe from the introduction of improper hardware, firmware, and software during the developmental and operational life of the IB.
Status:  Active DID Date:  01-NOV-2017      
  Next Review Due:  31-OCT-2022
SESS Doc Category:   Data Item Description  

Responsibilities
DID Approval Authority:  NS  National Security Agency
  Preparing Activity: NS  National Security Agency
Coordination:  Full  

Projects
 Project Number:     SESS-2024-009
Revision History Click on column headings for a description of column content.
MediaDocument Part DescriptionDist StmtDocument DatePagesSize
Document ImageRevision A Notice 2 - ValidationA01-NOV-201711.9 KB
Document ImageRevision A Notice 1 - ValidationA15-JAN-201311.9 KB
Document ImageRevision A A11-APR-2008432.7 KB
Document ImageBase Document A02-JUL-19933192.3 KB

NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.


  About Quick Search  |  Contact Us  |  FAQ  |  ASSIST  |  Privacy and Security  |  Section 508 Compliance  |  Defense Standardization Program  

WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.