Question:
Would this help, to deploy a good system ? What if people treat the document as a checklist of what not to do?
whistleblower33
2010-02-21 20:21:23 UTC
Standard: Configuration Management Plan
Phase: Production and Deployment
Activity: Systems Management
Task: Establish Configuration Management Strategy
Reference: DFAS 8000.1-R, Part C, Chapter 2
Effective Date: May 17, 2002





DEFENSE FINANCE AND ACCOUNTING SERVICE



Configuration Management Plan


For


Program Name



















Date of Issue and Status: Date plan acknowledged as acceptable (mm/dd/yyyy) and whether plan is draft or approved. Also include version number.

Issuing organization: Identify the organization issuing this plan.


CONFIGURATION MANAGEMENT PLAN


1. Purpose. This plan specifies processes and procedures for the execution of configuration management (CM) to support the entire software change/modification process.

2. Scope. This plan applies to all activities related to the establishment of system/configuration baseline and change and release of application configuration items (CIs). These CIs are identified in appendices to this plan.

3. Software Configuration Management Structure.

3.1. Organizational Components. Identify the organizational units or teams responsible for the system’s CM activities.

3.1.1. Systems Engineering. Identify and describe the systems engineering activities and tasks that will be accomplished and how the results of these efforts will be documented.

3.1.2. Configuration Management. Identify and describe CM tasks that will be performed.

3.1.3. Development Platform Engineering Team (DPET). Identify and describe the integration of release management procedures with informational and technical requirements necessary for release of software for test and production.

3.1.4. Configuration Control Board (CCB). Identify and describe the membership, roles, and responsibilities of the CCB.

3.2. Configuration Management Responsibilities. Describe the responsibilities of the organizational components performing CM activities.

3.2.1. Configuration Item Identification. Identify who is responsible for CI identification.

3.2.2. Configuration Control. Identify who is responsible for configuration control and describe the procedures for accomplishing configuration control (CI identification, establishing baselines, changes, deviations, waivers, configuration change orders (CCOs), CCB requirements).

3.2.3. Configuration Status Accounting. Identify who is responsible for configuration status accounting and describe the procedures for accomplishing configuration status accounting (CIs, baselines, records, databases, etc.) requirements.

3.2.4. Audits and Reviews. Identify the responsibilities involved in audits and reviews and describe what will be accomplished during each audit and review.

4. Software Configuration Management (SCM) Activities.

4.1. Configuration Identification. Describe the procedures for meeting the CI requirements, including a description of activities for identifying CIs and baseline items, formation of releases, and baselining of products.

4.2. Configuration Control. Describe the configuration control activities, including level of authority for approval, change proposal processing, and CCB roles and procedures.

4.3. Configuration Status Accounting. Identify reports required for status accounting, i.e., the status of CIs, SCRs, and releases.

4.4. Audits and Reviews. Describe the formal review/audit procedures to be used for configuration audits and reviews (functional configuration audits and physical configuration audits).

4.5. Scheduling and Tracking of SCM Activities. Describe the scheduling and tracking of CM activities that will be accomplished for each release.

5. Library Management. Describe the procedures to be used for development library environment management, release management library environment management, validation testing library environment management, and release certification.

6. Tools, Techniques, and Methodologies. Identify tools and techniques and describe any unique methodologies used to accomplish effective CM.

7. Records Collection and Retention. Identify CM information to be retained and the locations and methods of retention.

8. Procedures for Updating Plan. Describe the steps required to modify the plan to include version number and methodology.

9. Change Information Sheet. List the changes and additions included in the current version of the plan.


CONFIGURATION MANAGEMENT PLAN


APPENDIX A - ACRONYMS

Describe the acronyms as they are used in the plan.


APPENDIX B - DEFINITIONS

Describe the key terms as they are used in the plan.


APPENDIX C - REFERENCES

Provide a complete list of documents referenced in the text of the plan. Each reference shall contain, as approp
Three answers:
ricardo9505
2010-02-21 21:01:00 UTC
i thought this was a pokemon question. use the green dragon card
bosque
2016-12-26 20:51:43 UTC
they have been sturdy. capture The Rabbit the l. a. Police branch (LAPD), The FBI, and the CIA are all attempting to coach that they are the suitable at apprehending criminals. The President decides to furnish them a attempt. He releases a rabbit right into a woodland and each and each of them has to capture it. The CIA is going in. They place animal informants by using the woodland. They question all plant and mineral witnesses. After 3 months of extensive investigations they end that rabbits do no longer exist. The FBI is going in. After 2 weeks without leads they burn the woodland, killing each thing in it, which contain the rabbit, and that they make no apologies. The rabbit had it coming. The LAPD is going in. they arrive out 2 hours later with a badly crushed undergo. The undergo is yelling: "ok! ok! i'm a rabbit! i'm a rabbit!"
Pep
2010-02-21 20:29:30 UTC
Do your own work.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...