X hits on this document

32 views

0 shares

0 downloads

0 comments

8 / 12

<Project Name>

location>.

5.3 Configuration Management

Baseline security requirements for each system have been integrated into the Configuration Management process documented in <Project Management or Configuration Management document name> located on <full network path location>.

5.4 Risk Management

Baseline security requirements for each system have been integrated into the Risk Management process documented in <Project Management or Risk Management document name> located on <full network path location>.

5.5 Change Management

Baseline security requirements for each system have been integrated into the Change Management process documented in <Project Management or Change Management document name> located on <full network path location>.

EPLC Security Approach (v<1.0>)Page 7 of 12

[Insert appropriate disclaimer(s)]

Document info
Document views32
Page views32
Page last viewedSat Dec 10 09:43:09 UTC 2016
Pages12
Paragraphs226
Words1820

Comments