Basic Search
Text Search
ASSIST Updates
Data updated: 09 Jul 2025.
Home
|
About Quick Search
|
ASSIST
|
ASSIST Updates
Document Details
Basic Search
Text Search
Document ID:
EIA-649-1
Scroll down to access document images
Overview
Title:
Configuration Management Requirements for Defense Contractors
Scope:
This document applies to hardware and software and provides CM requirements to be placed on contracts after being tailored by the Acquirer. The requirements have been organized by the following five CM functions: a. Configuration Planning and Management b. Configuration Identification c. Configuration Change Management d. Configuration Status Accounting
e. Configuration Verification and Audit Responsibility of Acquiring and Supplying Activities
Responsibility of Acquirer
Status:
Active
Adoption Date:
10-NOV-2020
Next Review Due:
31-JUL-2029
FSC/Area:
SESS
Doc Category:
Electronic Components Industries Association (ECIA)
Reaffirmation Date:
01-AUG-2024
Responsibilities
Lead Standardization Activity:
SE
Director, Systems Engineering
Adopting Activity:
NM
Department of the Navy Standardization Office, DASN (RDT&E) (DepSO)
Coordination:
Full
Army Custodian:
AR
US Army Combat Capabilities Development Command, Armaments Center
Navy Custodian:
NM
Department of the Navy Standardization Office, DASN (RDT&E) (DepSO)
Air Force Custodian:
11
Air Force Life Cycle Management Center - Aircraft Systems
DLA Custodian:
CC
DLA Land and Maritime
Other Custodian:
SE
Director, Systems Engineering
Revision History
Click on column headings for a description of column content.
Media
Document Part Description
Dist Stmt
Document Date
Pages
Size
Notice - Adoption, Tier 1
A
10-NOV-2020
1
69.8 KB
NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.
About Quick Search
|
Contact Us
|
FAQ
|
ASSIST
|
Privacy and Security
|
Section 508 Compliance
|
Defense Standardization Program
WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.