Skip Navigation Links
MenuExpand
ASSIST
   Data updated: 01 Mar 2024. Home |  About Quick Search |  ASSIST |  ASSIST Updates Document Details

Document ID:   EIA-649-1       Scroll down to access document images

Overview
Title:  Configuration Management Requirements for Defense Contractors
Scope:  This document applies to hardware and software and provides CM requirements to be placed on contracts after being tailored by the Acquirer. The requirements have been organized by the following five CM functions: a. Configuration Planning and Management b. Configuration Identification c. Configuration Change Management d. Configuration Status Accounting
e. Configuration Verification and Audit Responsibility of Acquiring and Supplying Activities
Responsibility of Acquirer
Status:  Active Adoption Date:  10-NOV-2020      
  Next Review Due:  31-OCT-2025
SESS Doc Category:   Electronic Components Industries Association (ECIA)  
Reaffirmation Date:  01-NOV-2020

Responsibilities
Lead Standardization Activity:  SE  Director, Systems Engineering  
  Adopting Activity: NM  Department of the Navy Standardization Office, DASN (RDT&E) (DepSO)
Coordination:  Full  
Army Custodian:  AR   US Army Combat Capabilities Development Command, Armaments Center  
Navy Custodian:  NM   Department of the Navy Standardization Office, DASN (RDT&E) (DepSO)  
Air Force Custodian:  11   Air Force Life Cycle Management Center - Aircraft Systems  
DLA Custodian:  CC   DLA Land and Maritime  
Other Custodian:  SE   Director, Systems Engineering  

Revision History Click on column headings for a description of column content.
MediaDocument Part DescriptionDist StmtDocument DatePagesSize
Document ImageNotice - Adoption, Tier 1A10-NOV-2020169.8 KB

NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.


  About Quick Search  |  Contact Us  |  FAQ  |  ASSIST  |  Privacy and Security  |  Section 508 Compliance  |  Defense Standardization Program  

WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.