SA-10: Developer Configuration Management

CSF v1.1 References:

Threats Addressed:

Baselines:

  • Low

    N/A

  • Moderate
    • SA-10
  • High
    • SA-10

Next Version:

Control Statement

The organization requires the developer of the information system, system component, or information system service to:

  1. Perform configuration management during system, component, or service [Selection (one or more): design; development; implementation; operation];
  2. Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];
  3. Implement only organization-approved changes to the system, component, or service;
  4. Document approved changes to the system, component, or service and the potential security impacts of such changes; and
  5. Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].

Supplemental Guidance

This control also applies to organizations conducting internal information systems development and integration. Organizations consider the quality and completeness of the configuration management activities conducted by developers as evidence of applying effective security safeguards. Safeguards include, for example, protecting from unauthorized modification or destruction, the master copies of all material used to generate security-relevant portions of the system hardware, software, and firmware. Maintaining the integrity of changes to the information system, information system component, or information system service requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes. Configuration items that are placed under configuration management (if existence/use is required by other security controls) include: the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics; the running version of the object code; tools for comparing new versions of security-relevant hardware descriptions and software/firmware source code with previous versions; and test fixtures and documentation. Depending on the mission/business needs of organizations and the nature of the contractual relationships in place, developers may provide configuration management support during the operations and maintenance phases of the life cycle.

Control Enhancements

SA-10(1): Software / Firmware Integrity Verification

Baseline(s):

(Not part of any baseline)

The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.

SA-10(3): Hardware Integrity Verification

Baseline(s):

(Not part of any baseline)

The organization requires the developer of the information system, system component, or information system service to enable integrity verification of hardware components.

SA-10(4): Trusted Generation

Baseline(s):

(Not part of any baseline)

The organization requires the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions and software/firmware source and object code with previous versions.

SA-10(5): Mapping Integrity For Version Control

Baseline(s):

(Not part of any baseline)

The organization requires the developer of the information system, system component, or information system service to maintain the integrity of the mapping between the master build data (hardware drawings and software/firmware code) describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.

SA-10(6): Trusted Distribution

Baseline(s):

(Not part of any baseline)

The organization requires the developer of the information system, system component, or information system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.