5.7.2—Security of Configuration Documentation
>Control Description
The system configuration documentation often contains sensitive details (e.g., descriptions of applications, processes, procedures, data structures, authorization processes, data flow, etc.) Agencies shall protect the system documentation from unauthorized access consistent with the provisions described in Section 5.5 Access Control.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.