X hits on this document

51 views

0 shares

0 downloads

0 comments

8 / 12

<Project Name>

location>.

5.3 Configuration Management

Baseline security requirements for each system have been integrated into the Configuration Management process documented in <Project Management or Configuration Management document name> located on <full network path location>.

5.4 Risk Management

Baseline security requirements for each system have been integrated into the Risk Management process documented in <Project Management or Risk Management document name> located on <full network path location>.

5.5 Change Management

Baseline security requirements for each system have been integrated into the Change Management process documented in <Project Management or Change Management document name> located on <full network path location>.

EPLC Security Approach (v<1.0>)Page 7 of 12

[Insert appropriate disclaimer(s)]

Document info
Document views51
Page views52
Page last viewedMon Jan 23 21:02:10 UTC 2017
Pages12
Paragraphs226
Words1820

Comments