Guide to Understanding Configuration Management in Trusted Systems
A set of good practices related to configuration management in Automated Data Processing systems employed for processing classified and other information. Provides guidance to developers of trusted systems on what configuration management is and how it may be implemented in the development and life-cycle of a trusted system.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
9.1 THE BASELINE 9.3 THE CONFIGURATION ADP system approved changes AUTOMATED TOOLS B2 requirements baseline concept baseline example Bell Laboratories change request CMS directory Computer Security Center configuration accounting configuration audit Configuration Control Board configuration identification configuration item numbers configuration management plan configuration management procedures configuration management requirements configuration management system configuration status accounting control of changes delta descriptive top-level specification design and development ensure firmware FUNCTIONS OF CONFIGURATION guideline maintain control maintained under configuration makefile master copy Master Library meet the TCSEC National Computer Security NCSC object code perform the change proposed changes RAMP Ratings Maintenance Program Requirement 18 requirements for configuration responsible SCCS Section 9.3 security policy software build software library source code status accounting information successful configuration management system shall maintain TCB configuration TCB hardware TCB software TCB versions TCSEC class B2 TCSEC requirements test fixtures Trusted Computing Base trusted distribution trusted systems Unix