SA-10 - Developer Configuration Management
Control requirements
SA-10 (a)
Require the developer of the system, system component, or system service to: Perform configuration management during system, component, or service [IBM Assignment: development, implementation, AND operation].
SA-10 (b)
Require the developer of the system, system component, or system service to: Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management].
SA-10 (c)
Require the developer of the system, system component, or system service to: Implement only organization-approved changes to the system, component, or service.
SA-10 (d)
Require the developer of the system, system component, or system service to: Document approved changes to the system, component, or service and the potential security and privacy impacts of such changes.
SA-10 (e)
Require the developer of the system, system component, or system service to: Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].
Additional IBM Cloud for Financial Services specifications
The organization shall ensure that changes to customer data are subject to change control per customer requirements. Changes of any type should be communicated to the customer as they arise.
Container Security Requirements: • The build execution context and the build system must be trustable and maintained compliant to the security requirements to guarantee the integrity of images during the build process.
Implementation guidance
See the resources that follow to learn more about how to implement this control.
NIST supplemental guidance
Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecting the master copies of material used to generate security-relevant portions of the system hardware, software, and firmware from unauthorized modification or destruction. Maintaining the integrity of changes to the system, system component, or system service requires strict configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes. The configuration items that are placed under configuration management include the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics; the current running version of the object code; tools for comparing new versions of security-relevant hardware descriptions and source code with previous versions; and test fixtures and documentation. Depending on the mission and business needs of organizations and the nature of the contractual relationships in place, developers may provide configuration management support during the operations and maintenance stage of the system development life cycle.