About 786 results
Open links in new tab
  1. To ensure that the required adjustments to the system configuration do not adversely affect the security of the system or the organization from operation of the system, a well-defined …

  2. SP 800-128, Guide for Security-Focused Configuration Management

    Oct 10, 2019 · In addition to the fundamental concepts associated with SecCM, the process of applying SecCM practices to information systems is described.

  3. As part of the configuration change control effort, organizations can employ a variety of methods for restricting access to the process for making changes to the system, including access …

  4. configuration control board (CCB) - Glossary | CSRC

    A group of qualified people with responsibility for the process of regulating and approving changes to hardware, firmware, software, and documentation throughout the development and …

  5. Discussion: In contrast to access control approaches that employ sta c accounts and predefined user privileges, dynamic access control approaches rely on run me access control decisions …

  6. Configuration Management Concepts Document | NIST

    Sep 1, 1991 · It is a formal discipline which provides methods and tools (a) to identify components, versions, and baselines of selected items and b) to control changes made to …

  7. 6.1.3. What is Process Control? - NIST

    6.1.3. What is Process Control?

  8. Change processes are the portion of system development that prioritize change requests and evaluate alternative proposed change orders based on the effect on the productivity and …

  9. Control Baselines for Information Systems and Organizations. This version contains only the control baseline tables.

  10. These systems/devices detect or cause a direct change through the monitoring and/or control of devices, processes, and events. Examples include industrial control systems, building …