SA-5 System Documentation
Last Review: 10/1/22
Statement
Information Resource owners/custodians are responsible for maintaining proper documentation on the current version of the Information Resource. This documentation should be shared with the Security Office upon request.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.
Implementation
The information resource owner, or designee, is responsible for:
- Obtaining administrator documentation for the information resource, system component, or information system service that describes:
- Secure configuration, installation, and operation of the information resource, component, or service
- Effective use and maintenance of security functions
- Known vulnerabilities regarding configuration and use of administrative functions.
- Obtaining user documentation for the information resource, system component, or information system service that describes:
- Operations of User-accessible security functions
- Methods for user interaction, which enables individuals to use the information resource, component, or service in a more secure manner
- User responsibilities in maintaining the security of the information resource, component, or service.
- Protecting documentation as required, in accordance with the risk management strategy; and
- Distributing documentation to appropriate information resource custodians and users.
If documentation is not available the responsible party should document attempts to obtain the documentation.