Basic Search
Text Search
ASSIST Updates
Data updated: 21 Mar 2025.
Home
|
About Quick Search
|
ASSIST
|
ASSIST Updates
Document Details
Basic Search
Text Search
Document ID:
DI-SESS-81343
Scroll down to access document images
Overview
Title:
Information Security (INFOSEC) Boundary Configuration Management Plan (No S/S Document)
Scope:
The INFOSEC Boundary (IB) Configuration Management (CM) Plan details the IB configuration control process, configuration management procedures, and review and approval procedures for changes to the security design implementation of the IB. It addresses hardware, firmware, software, testing and documentation at the various levels of trust. The IB CM Plan indicates how the security requirements baseline will be maintained during the operational life of the IB and provides assurance that the security protections are safe from the introduction of improper hardware, firmware, and software during the developmental and operational life of the IB.
Status:
Canceled
Cancellation Date:
08-JAN-2024
FSC/Area:
SESS
Doc Category:
Data Item Description
Responsibilities
DID Approval Authority:
NS
National Security Agency
Preparing Activity:
NS
National Security Agency
DoD Interest Level:
/
Prepared by DoD activity
Coordination:
Full
Other Custodian:
NS
National Security Agency
Revision History
Click on column headings for a description of column content.
Media
Document Part Description
Dist Stmt
Document Date
Pages
Size
Revision A Notice 3 - Cancellation
A
08-JAN-2024
1
248.7 KB
Revision A Notice 2 - Validation
A
01-NOV-2017
1
1.9 KB
Revision A Notice 1 - Validation
A
15-JAN-2013
1
1.9 KB
Revision A
A
11-APR-2008
4
32.7 KB
Base Document
A
02-JUL-1993
3
192.3 KB
NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.
About Quick Search
|
Contact Us
|
FAQ
|
ASSIST
|
Privacy and Security
|
Section 508 Compliance
|
Defense Standardization Program
WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.