Skip Navigation Links
MenuExpand
ASSIST
   Data updated: 21 Mar 2025. Home |  About Quick Search |  ASSIST |  ASSIST Updates Document Details

Document ID:   DI-SESS-81343       Scroll down to access document images

Overview
Title:  Information Security (INFOSEC) Boundary Configuration Management Plan (No S/S Document)
Scope:  The INFOSEC Boundary (IB) Configuration Management (CM) Plan details the IB configuration control process, configuration management procedures, and review and approval procedures for changes to the security design implementation of the IB. It addresses hardware, firmware, software, testing and documentation at the various levels of trust. The IB CM Plan indicates how the security requirements baseline will be maintained during the operational life of the IB and provides assurance that the security protections are safe from the introduction of improper hardware, firmware, and software during the developmental and operational life of the IB.
Status:  Canceled Cancellation Date:  08-JAN-2024      
SESS Doc Category:   Data Item Description  

Responsibilities
DID Approval Authority:  NS  National Security Agency
  Preparing Activity: NS  National Security Agency
DoD Interest Level:  / Prepared by DoD activity
Coordination:  Full  
Other Custodian:  NS   National Security Agency  

Revision History Click on column headings for a description of column content.
MediaDocument Part DescriptionDist StmtDocument DatePagesSize
Document ImageRevision A Notice 3 - CancellationA08-JAN-20241248.7 KB
Document ImageRevision A Notice 2 - ValidationA01-NOV-201711.9 KB
Document ImageRevision A Notice 1 - ValidationA15-JAN-201311.9 KB
Document ImageRevision A A11-APR-2008432.7 KB
Document ImageBase Document A02-JUL-19933192.3 KB

NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.


  About Quick Search  |  Contact Us  |  FAQ  |  ASSIST  |  Privacy and Security  |  Section 508 Compliance  |  Defense Standardization Program  

WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.