Under active development Content is continuously updated and improved

5.7.2Security of Configuration Documentation

>Control Description

The system configuration documentation often contains sensitive details (e.g., descriptions of applications, processes, procedures, data structures, authorization processes, data flow, etc.) Agencies shall protect the system documentation from unauthorized access consistent with the provisions described in Section 5.5 Access Control.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.