Change controls for software development are in place to prevent unauthorized programs or modifications to programs from being implemented.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACIII | Medium | Enclave Computing Environment |
Threat |
---|
The integrity of computer systems is at risk if software development change controls are not established and implemented. A Configuration Management (CM) plan greatly reduces the risk of unauthorized program modification. |
Guidance |
---|
1. A CM plan shall be established and implemented, and the CM plan shall include how software change requests (SCRs) are prepared, submitted, processed, and tracked. 2. The IAM/IAO and the site’s lead developer/programmer shall authorize and document the roles, responsibilities, and privileges for all personnel allowed to make software development changes. 3. The System Administrator shall institute access controls limiting the software developer accounts to the minimum number of privileges needed to perform their assigned duties. |