SKIP TO PAGE CONTENT

SA-5 System Documentation

Last Review: 10/1/22

Statement

Information Resource owners/custodians are responsible for maintaining proper documentation on the current version of the Information Resource.  This documentation should be shared with the Security Office upon request.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

The information resource owner, or designee, is responsible for:

  • Obtaining administrator documentation for the information resource, system component, or information system service that describes:
    • Secure configuration, installation, and operation of the information resource, component, or service
    • Effective use and maintenance of security functions
    • Known vulnerabilities regarding configuration and use of administrative functions.
  • Obtaining user documentation for the information resource, system component, or information system service that describes:
    • Operations of User-accessible security functions
    • Methods for user interaction, which enables individuals to use the information resource, component, or service in a more secure manner
    • User responsibilities in maintaining the security of the information resource, component, or service.
  • Protecting documentation as required, in accordance with the risk management strategy; and
  • Distributing documentation to appropriate information resource custodians and users.

If documentation is not available the responsible party should document attempts to obtain the documentation.

Phone
Twitter
Facebook
Instagram
Mail