X hits on this document

44 views

0 shares

0 downloads

0 comments

4 / 12

<Project Name>

TABLE OF CONTENTS

1INTRODUCTION4

1.1Purpose of the Security Approach4

2Security approach4

2.1Process Overview4

2.2Security Approach Summary4

3TEAM Members5

3.1Certification and Accreditation Team5

3.2Security Team5

4System categorization5

4.1Core Systems5

4.2Sub-Systems6

4.3Interconnected Systems6

5PROGRAMMATIC activities6

5.1Team Training6

5.2Requirements Management6

5.3Configuration Management7

5.4Risk Management7

5.5Change Management7

Appendix A: Security Approach Approval8

APPENDIX B: REFERENCES9

APPENDIX C: KEY TERMS10

APPENDIX D: RELATED DOCUMENTS11

1

EPLC Security Approach (v<1.0>)Page 3 of 12

[Insert appropriate disclaimer(s)]

Document info
Document views44
Page views45
Page last viewedFri Jan 20 23:25:43 UTC 2017
Pages12
Paragraphs226
Words1820

Comments