Information Security Governance Papers

Paper Title Configuration Management and Control30
The Abstract of The Paper Ensure adequate consideration of the potential security impacts due to specific changes to an information system or its surrounding environment. CM and configuration control procedures are critical to establishing an initial baseline of hardware, software, and firmware components for the information system and for subsequently controlling and maintaining an accurate inventory of any changes to the system.
Develop CM plan

Establish baselines

Identify configuration

Describe configuration control process

Identify schedule for configuration audits
Web Link http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf

Back To Information Security Governance Papers List

Database Sections