5.4: SUP.8 Configuration Management
Configuration Management (CM) is the backbone of repeatable, auditable, and compliant development in safety-critical embedded systems. Without disciplined CM, organizations cannot reliably recreate a build, prove which version of a requirement was tested, or demonstrate to an assessor that a specific baseline was released to production. In ASPICE 4.0, SUP.8 governs how all work products -- requirements documents, architecture models, source code, test cases, build configurations, trained ML models, and documentation -- are identified, versioned, baselined, and controlled throughout the project lifecycle.
AI integration transforms CM from a manual bookkeeping exercise into an intelligent, continuous integrity service. Rather than relying on engineers to remember which files belong in a baseline or manually checking that a commit message follows convention, AI can automatically classify configuration items, validate baseline completeness, detect drift between environments, and generate compliance reports. The human retains authority over baseline approval and release decisions; the AI ensures that the underlying data is consistent, complete, and traceable.
Process Definition
Purpose
SUP.8 Purpose: To establish and maintain the integrity of all work products of the process or project.
Configuration management ensures that every artifact produced during the development lifecycle is uniquely identified, version-controlled, and protected against unauthorized or untracked changes. This is foundational for traceability (required by ASPICE, ISO 26262, and ISO/SAE 21434), reproducibility (the ability to recreate any historical build), and auditability (the ability to demonstrate compliance to an external assessor).
Outcomes
| Outcome | Description |
|---|---|
| O1 | A configuration management strategy is specified |
| O2 | Configuration items are identified, defined, and baselined |
| O3 | Modifications to configuration items are controlled |
| O4 | The configuration status is up to date and accurately reported |
Relationship to Other Processes
SUP.8 provides essential infrastructure that other ASPICE processes depend on:
| Related Process | Dependency on SUP.8 |
|---|---|
| SUP.10 Change Request Management | CRs modify configuration items; SUP.8 ensures modifications are controlled and traceable |
| SUP.9 Problem Resolution | Problem fixes result in CI modifications; SUP.8 tracks which baseline contains which fix |
| SUP.2 Verification | Verification must reference specific CI versions; SUP.8 ensures version accuracy |
| SWE.1-6 Software Engineering | All software work products are configuration items managed under SUP.8 |
| MAN.3 Project Management | Project plans reference baselines; SUP.8 ensures baseline integrity |
Base Practices with AI Integration
| BP | Base Practice | AI Level | AI Application | HITL Gate |
|---|---|---|---|---|
| BP1 | Specify a configuration management strategy | L1 | Strategy templates, tool configuration scaffolding, convention enforcement rules | Human approves CM plan and strategy document |
| BP2 | Identify and define configuration items | L2 | Automated CI discovery by scanning repositories; classification based on file type, location, and metadata; gap detection for untracked artifacts | Human confirms CI catalog completeness |
| BP3 | Establish baselines | L2 | Baseline consistency verification; completeness checks against CI catalog; automated baseline report generation | Human approves every baseline |
| BP4 | Manage modifications to configuration items | L2-L3 | Automated gates (commit message validation, branch naming, merge request checks); unauthorized change detection; drift monitoring | Human reviews flagged anomalies; approves merge requests |
| BP5 | Report configuration management status | L2-L3 | Automated dashboard generation; baseline comparison reports; CI health scoring; trend analysis | Human reviews and distributes reports at milestones |
Baseline Approval Authority: AI performs completeness and consistency checks, but the Configuration Manager or designated authority retains sole approval for baseline creation. Baselines are formal snapshots that serve as legal evidence in safety-critical domains; their creation requires human judgment and accountability.
Configuration Management Strategy (BP1)
Strategy Components
A CM strategy document defines the rules, tools, and procedures that govern configuration management throughout the project. AI assists by generating strategy templates tailored to the project's technology stack and compliance requirements.
| Component | Description | AI Assistance |
|---|---|---|
| Scope | Which work products are configuration items | AI scans repository structure and recommends CI candidates based on file types and project conventions |
| Identification Scheme | Naming conventions, version numbering, CI identifiers | AI validates adherence to naming rules on every commit |
| Version Control | Branching strategy, merge rules, tag conventions | AI enforces branch naming and merge request templates |
| Baseline Policy | When baselines are created, what they contain, approval workflow | AI checks baseline completeness against CI catalog |
| Change Control | How modifications to baselined items are authorized | Links to SUP.10 Change Request Management |
| Tool Environment | Tools used for CM (Git, ALM, artifact storage) | AI configures integration hooks between tools |
| Roles and Responsibilities | Configuration Manager, baseline approvers, developers | AI routes notifications based on role assignments |
| Audit and Reporting | CM status reports, audit schedule, metrics | AI generates automated reports and dashboards |
Branching Strategy
A disciplined branching model is essential for parallel development, release management, and baseline traceability. The following strategy is typical for automotive embedded projects:
| Branch Type | Naming Convention | Purpose | Lifetime | Protection |
|---|---|---|---|---|
| main | main |
Production-ready code; every commit is a potential release candidate | Permanent | Protected: no direct push; merge request required with approvals |
| develop | develop |
Integration branch for the next release; all feature branches merge here | Permanent | Protected: merge request required; CI must pass |
| feature | feature/{ticket-id}/{short-desc} |
New functionality development | Until merged to develop | Unprotected; developer ownership |
| bugfix | bugfix/{ticket-id}/{short-desc} |
Defect correction linked to a problem report | Until merged to develop | Unprotected; developer ownership |
| release | release/{version} |
Stabilization branch for an upcoming release; only bug fixes allowed | From release candidate creation to release tag | Protected: only bugfix merges; CI must pass |
| hotfix | hotfix/{ticket-id}/{short-desc} |
Emergency fix to production code | Until merged to main and develop | Protected: expedited review; mandatory CI |
Commit Message Convention
Consistent commit messages enable automated changelog generation, traceability linking, and AI-based classification. The following convention is enforced by pre-commit hooks and CI validation:
<type>(<scope>): <description>
[optional body]
[optional footer(s)]
Refs: <ticket-id>
| Type | When to Use | Example |
|---|---|---|
feat |
New functionality added | feat(door-lock): add temperature compensation for GPIO timing |
fix |
Defect correction | fix(can-auth): correct MAC validation for extended frames |
docs |
Documentation-only changes | docs(srs): update timing requirements for cold operation |
refactor |
Code restructuring without behavior change | refactor(gpio): extract drive strength configuration to separate module |
test |
Adding or modifying tests | test(door-lock): add boundary tests for -40C operation |
chore |
Build, tooling, or maintenance changes | chore(ci): add baseline consistency check to pipeline |
AI Enforcement: A pre-commit hook validates the commit message format. If the message does not match the convention, the commit is rejected with a descriptive error message. AI can also suggest corrections for malformed messages.
Configuration Item Identification (BP2)
CI Catalog
The CI catalog is the master inventory of all work products under configuration control. AI assists by scanning the repository structure, file types, and project conventions to recommend items that should be tracked.
Note: Repository URL patterns (polarion://, git://, git-lfs://) are illustrative; adapt to actual infrastructure.
# Configuration Item Catalog
ci_catalog:
project: BCM Door Lock Control
version: 2.0
last_updated: 2025-12-17
maintained_by: Configuration Manager
configuration_items:
# Requirements
- id: CI-REQ-001
name: System Requirements Specification
type: document
format: Polarion Live Document
location: polarion://BCM/SYS # Adapt to actual tool URL
owner: System Architect
baseline: included
safety_relevant: true
change_control: SUP.10 CR required
- id: CI-REQ-002
name: Software Requirements Specification
type: document
format: Polarion Live Document
location: polarion://BCM/SWE
owner: SW Lead
baseline: included
safety_relevant: true
change_control: SUP.10 CR required
# Architecture
- id: CI-ARCH-001
name: System Architecture
type: model
format: Enterprise Architect (.eap)
location: git://bcm-project/architecture/system_arch.eap
owner: System Architect
baseline: included
safety_relevant: true
change_control: SUP.10 CR required
- id: CI-ARCH-002
name: Software Architecture
type: model
format: Enterprise Architect (.eap) + Markdown descriptions
location: git://bcm-project/architecture/sw_arch/
owner: SW Architect
baseline: included
safety_relevant: true
change_control: SUP.10 CR required
# Source Code
- id: CI-SRC-001
name: Application Layer Source
type: code
format: C99 source and headers
location: git://bcm-project/src/app/*
owner: SW Lead
baseline: included
safety_relevant: true
change_control: merge request with review
- id: CI-SRC-002
name: MCAL Configuration
type: code
format: C99 source, AUTOSAR XML configuration
location: git://bcm-project/src/mcal/*
owner: HW/SW Integration Lead
baseline: included
safety_relevant: true
change_control: merge request with review
- id: CI-SRC-003
name: Board Support Package
type: code
format: C99 source, linker scripts
location: git://bcm-project/src/bsp/*
owner: HW/SW Integration Lead
baseline: included
safety_relevant: true
change_control: merge request with review
# Test Artifacts
- id: CI-TEST-001
name: Unit Test Suite
type: code
format: C test source (Unity/CMock framework)
location: git://bcm-project/test/unit/*
owner: Test Lead
baseline: included
safety_relevant: true
change_control: merge request with review
- id: CI-TEST-002
name: Integration Test Suite
type: code
format: Robot Framework / pytest
location: git://bcm-project/test/integration/*
owner: Test Lead
baseline: included
safety_relevant: true
change_control: merge request with review
- id: CI-TEST-003
name: System Test Specifications
type: document
format: Polarion Test Cases
location: polarion://BCM/TEST
owner: Test Lead
baseline: included
safety_relevant: true
change_control: SUP.10 CR required
# Build Configuration
- id: CI-BUILD-001
name: Build Configuration
type: configuration
format: CMake files, toolchain definitions
location: git://bcm-project/tools/cmake/*
owner: DevOps
baseline: included
safety_relevant: true
change_control: merge request with review
- id: CI-BUILD-002
name: CI/CD Pipeline Definition
type: configuration
format: YAML (GitLab CI / Jenkins)
location: git://bcm-project/.gitlab-ci.yml
owner: DevOps
baseline: included
safety_relevant: false
change_control: merge request with review
# ML Model (if applicable)
- id: CI-ML-001
name: Trained ML Model
type: binary
format: TensorRT engine, ONNX
location: git-lfs://bcm-project/models/*.engine
owner: ML Lead
baseline: included
safety_relevant: true
change_control: SUP.10 CR required + ML validation record
# Documentation
- id: CI-DOC-001
name: Safety Manual
type: document
format: PDF / Word
location: git://bcm-project/docs/safety/*
owner: Safety Manager
baseline: included
safety_relevant: true
change_control: SUP.10 CR required
- id: CI-DOC-002
name: Release Notes
type: document
format: Markdown
location: git://bcm-project/CHANGELOG.md
owner: Project Manager
baseline: included
safety_relevant: false
change_control: automated generation from commit history
AI-Assisted CI Discovery
AI scans the repository to detect configuration items that may be missing from the catalog:
AI CI Discovery Report
──────────────────────
Project: BCM Door Lock Control
Scan Date: 2025-12-17
New Files Detected (not in CI catalog):
────────────────────────────────────────
1. src/driver/temp_sensor.c [RECOMMENDATION: Add as CI-SRC-004]
- Reason: C source file in tracked directory, safety-relevant path
- Owner suggestion: HW/SW Integration Lead
2. test/integration/test_temp_compensation.py [RECOMMENDATION: Add as CI-TEST-004]
- Reason: Integration test file, references CI-SRC-001
3. docs/design/gpio_timing_analysis.xlsx [WARNING: Binary in Git]
- Reason: Binary file should use Git LFS or document management system
- Owner suggestion: SW Architect
Orphaned CIs (in catalog but not in repository):
─────────────────────────────────────────────────
None detected.
Stale CIs (not modified in > 180 days):
────────────────────────────────────────
1. CI-DOC-001 (Safety Manual) - Last modified 2025-06-10
- Action: Verify document is current for next baseline
Confidence: 0.92
Human Action Required:
□ Review recommendations and update CI catalog
□ Confirm or reject each suggestion
Automated CM Controls (BP4)
CI/CD Integration
Automated gates in the CI/CD pipeline enforce CM rules without relying on human vigilance for routine checks. The pipeline validates commit messages, branch names, file presence, and traceability before allowing code to proceed.
# GitLab CI/CD CM Controls
stages:
- validate
- build
- test
- baseline
- release
cm_validation:
stage: validate
script:
# Check commit message format
- |
if ! echo "$CI_COMMIT_MESSAGE" | grep -qE "^(feat|fix|docs|refactor|test|chore)\(.+\):";
then
echo "ERROR: Commit message does not follow convention"
echo "Expected: <type>(<scope>): <description>"
echo "Example: feat(door-lock): add temperature compensation"
exit 1
fi
# Check branch naming
- |
if ! echo "$CI_COMMIT_BRANCH" | grep -qE "^(main|develop|feature/|bugfix/|release/|hotfix/)";
then
echo "ERROR: Branch name does not follow convention"
echo "Expected: feature/<ticket>/<desc>, bugfix/<ticket>/<desc>, etc."
exit 1
fi
# Check for required files
- test -f CHANGELOG.md
- test -f VERSION
# Validate traceability
- python scripts/validate_traceability.py
# AI: Check for unauthorized modifications to protected CIs
- python scripts/check_protected_ci_modifications.py
baseline_check:
stage: baseline
rules:
- if: $CI_COMMIT_TAG
script:
# Verify all CIs at correct version
- python scripts/verify_baseline.py --tag $CI_COMMIT_TAG
# Generate baseline report
- python scripts/generate_baseline_report.py --output baseline_report.md
# Check baseline consistency
- python scripts/check_baseline_consistency.py
# AI: Verify CI catalog completeness
- python scripts/ai_ci_discovery.py --mode verify --baseline $CI_COMMIT_TAG
artifacts:
paths:
- baseline_report.md
release:
stage: release
rules:
- if: $CI_COMMIT_TAG =~ /^v\d+\.\d+\.\d+$/
script:
# Create release package
- ./scripts/create_release_package.sh $CI_COMMIT_TAG
# Generate release notes
- python scripts/generate_release_notes.py --tag $CI_COMMIT_TAG
# Archive release artifacts
- ./scripts/archive_release.sh $CI_COMMIT_TAG
# AI: Generate compliance evidence package
- python scripts/generate_compliance_evidence.py --tag $CI_COMMIT_TAG
artifacts:
paths:
- release/*.zip
- release/release_notes.md
- release/compliance_evidence.pdf
Pre-Commit Hook Configuration
Local pre-commit hooks provide immediate feedback to developers before changes reach the server:
# .pre-commit-config.yaml
repos:
- repo: local
hooks:
# Commit message convention
- id: commit-msg-check
name: Validate commit message format
entry: scripts/hooks/check_commit_msg.sh
language: script
stages: [commit-msg]
# Prevent large binary files from entering Git
- id: no-large-binaries
name: Block large binary files
entry: scripts/hooks/check_binary_size.sh
language: script
args: ['--max-size', '1M']
# Ensure copyright headers
- id: copyright-header
name: Check copyright header in source files
entry: scripts/hooks/check_copyright.sh
language: script
types: [c, header]
# MISRA compliance quick check
- id: misra-quick
name: MISRA C quick check
entry: scripts/hooks/misra_quick_check.sh
language: script
types: [c]
# Prevent secrets from being committed
- id: no-secrets
name: Detect potential secrets
entry: scripts/hooks/detect_secrets.sh
language: script
Merge Request Template
Merge request templates ensure that every code change includes the required CM metadata:
## Change Description
<!-- What does this change do? -->
## Related Items
- Change Request: CR-YYYY-NNN (if applicable)
- Problem Report: PR-YYYY-NNN (if applicable)
- Requirement(s): SWE-BCM-XXX
## Configuration Items Modified
<!-- List affected CIs from the CI catalog -->
- [ ] CI-SRC-001 (Application Layer Source)
- [ ] CI-TEST-001 (Unit Test Suite)
## Verification Checklist
- [ ] Unit tests pass
- [ ] Integration tests pass
- [ ] Static analysis clean (no new findings)
- [ ] MISRA compliance verified
- [ ] Documentation updated (if applicable)
- [ ] Traceability links updated
## Reviewer Checklist
- [ ] Code follows project coding standards
- [ ] Change is consistent with architecture
- [ ] Safety impact assessed (if safety-relevant CI modified)
- [ ] CI catalog entry updated (if new files added)
Baseline Management (BP3)
Baseline Types
Baselines are formal snapshots of the configuration at a defined point in time. They serve as reference points for development, testing, release, and audit activities.
| Baseline Type | When Created | Contents | Approval Authority |
|---|---|---|---|
| Functional Baseline | After system requirements approval | System requirements, system architecture, safety plan | System Architect + Safety Manager |
| Allocated Baseline | After SW/HW requirements allocation | Software requirements, hardware requirements, interface specifications | SW Lead + HW Lead |
| Design Baseline | After detailed design review | Architecture models, detailed design documents, interface definitions | SW Architect + Review Board |
| Development Baseline | At code freeze for a release candidate | All source code, unit tests, build configuration, MCAL config | SW Lead + DevOps |
| Product Baseline | After successful system testing and release approval | All CIs in the CI catalog; the complete, tested, releasable product | Project Manager + QA Lead + Safety Manager |
Baseline Definition
The following diagram shows the baseline status across project milestones, indicating which configuration items are included, their versions, and the approval status of each baseline.
Baseline Consistency Verification
AI performs automated consistency checks before baseline approval:
AI Baseline Consistency Report
──────────────────────────────
Baseline: BL-BCM-3.0.0-RC1
Type: Development Baseline
Date: 2025-12-15
CI Catalog Version: 2.0
Completeness Check:
───────────────────
[PASS] CI-REQ-001 System Requirements Specification v2.3
[PASS] CI-REQ-002 Software Requirements Specification v3.1
[PASS] CI-ARCH-001 System Architecture v2.1
[PASS] CI-ARCH-002 Software Architecture v2.4
[PASS] CI-SRC-001 Application Layer Source commit a1b2c3d
[PASS] CI-SRC-002 MCAL Configuration commit e4f5g6h
[PASS] CI-SRC-003 Board Support Package commit i7j8k9l
[PASS] CI-TEST-001 Unit Test Suite commit m0n1o2p
[PASS] CI-TEST-002 Integration Test Suite commit q3r4s5t
[PASS] CI-TEST-003 System Test Specifications v1.8
[PASS] CI-BUILD-001 Build Configuration commit u6v7w8x
[PASS] CI-BUILD-002 CI/CD Pipeline Definition commit y9z0a1b
[PASS] CI-ML-001 Trained ML Model v1.2.0
[PASS] CI-DOC-001 Safety Manual v2.0
[PASS] CI-DOC-002 Release Notes v3.0.0-RC1
Result: 15/15 CIs present and versioned
Consistency Checks:
───────────────────
[PASS] All open CRs resolved or deferred with documented rationale
[PASS] No suspect traceability links remaining
[PASS] All unit tests pass (coverage: 94.2%)
[PASS] All integration tests pass
[PASS] Static analysis: 0 critical, 0 high findings
[PASS] Build reproducible from tagged commit
[WARN] CI-DOC-001 last modified 2025-06-10 (> 90 days ago)
→ Verify Safety Manual is current
Open Change Requests Against This Baseline:
────────────────────────────────────────────
CR-2025-018: Deferred to v3.1.0 (rationale documented)
CR-2025-022: Closed (implemented and verified)
Overall Status: READY FOR APPROVAL (1 warning)
Confidence: 0.95
Human Action Required:
□ Review warning for CI-DOC-001 staleness
□ Approve baseline creation
□ Sign baseline approval record
Baseline Approval Record
# Baseline Approval Record
baseline_approval:
baseline_id: BL-BCM-3.0.0
baseline_type: product
creation_date: 2025-12-20
tag: v3.0.0
ci_versions:
CI-REQ-001: v2.3
CI-REQ-002: v3.1
CI-ARCH-001: v2.1
CI-ARCH-002: v2.4
CI-SRC-001: a1b2c3d
CI-SRC-002: e4f5g6h
CI-SRC-003: i7j8k9l
CI-TEST-001: m0n1o2p
CI-TEST-002: q3r4s5t
CI-TEST-003: v1.8
CI-BUILD-001: u6v7w8x
CI-BUILD-002: y9z0a1b
CI-ML-001: v1.2.0
CI-DOC-001: v2.0
CI-DOC-002: v3.0.0
ai_consistency_check:
status: pass
confidence: 0.95
warnings: 1
report: baseline_report_BL-BCM-3.0.0.md
approvals:
- role: Configuration Manager
name: (Configuration Manager Name)
date: 2025-12-20
decision: approved
- role: QA Lead
name: (QA Lead Name)
date: 2025-12-20
decision: approved
- role: Safety Manager
name: (Safety Manager Name)
date: 2025-12-20
decision: approved
condition: "Safety Manual confirmed current per review on 2025-12-18"
- role: Project Manager
name: (Project Manager Name)
date: 2025-12-20
decision: approved
status: approved
Configuration Management Framework
The diagram below presents the overall CM framework, showing how configuration identification, change control, status accounting, and auditing activities interrelate.
CM Status Reporting (BP5)
Automated CM Dashboard
The following diagram shows the CM status dashboard, providing real-time visibility into configuration item counts, baseline status, pending changes, and audit results.
Status Report Structure
AI generates CM status reports at configurable intervals (weekly, per milestone, or on demand). Reports cover the following dimensions:
| Report Section | Content | AI Generation Method |
|---|---|---|
| CI Inventory Summary | Total CIs, CIs by type, new CIs since last report | Query CI catalog + Git history |
| Baseline Status | Current baselines, pending baselines, baseline history | Query tag history + approval records |
| Modification Activity | Commits, merge requests, and CRs since last report; top contributors | Git log analysis + ALM query |
| Open Change Requests | CRs pending implementation that affect baselined CIs | ALM query + CI catalog cross-reference |
| Build Reproducibility | Whether the current baseline can be rebuilt from source | Automated rebuild test result |
| Compliance Score | Percentage of CIs with complete metadata, traceability, and review | AI scoring across all CI attributes |
| Anomalies and Warnings | Unauthorized changes, stale CIs, broken builds, missing traceability | AI anomaly detection |
Example Status Report
Configuration Management Status Report
═══════════════════════════════════════
Project: BCM Door Lock Control
Period: 2025-12-01 to 2025-12-15
Generated: 2025-12-15 by AI CM Reporter
CI Inventory:
─────────────
Total CIs: 15
New since last: 1 (CI-SRC-004 temp_sensor.c added)
Removed: 0
Catalog completeness: 100%
Baseline Status:
────────────────
Current product baseline: BL-BCM-2.0.0 (tagged v2.0.0)
Pending baseline: BL-BCM-3.0.0-RC1 (in preparation)
Baselines this period: 0
Modification Activity:
──────────────────────
Commits (develop): 47
Merge requests: 12 (11 merged, 1 open)
Change requests: 3 (2 closed, 1 in implementation)
Convention violations: 2 (both caught by pre-commit hook, corrected)
Build Reproducibility:
──────────────────────
BL-BCM-2.0.0: [PASS] Rebuild matches original (SHA256 verified)
develop HEAD: [PASS] Build succeeds; all tests pass
Compliance Score: 96/100
────────────────────────
Deductions:
-2 CI-DOC-001: Stale (last update > 90 days)
-2 CI-TEST-002: 1 integration test disabled without documented rationale
Anomalies:
──────────
[WARN] Direct push to develop branch detected on 2025-12-08 (commit f3e2d1c)
→ Bypassed merge request process
→ Assignee notified; process reminder sent
[INFO] 1 file in src/ directory not in CI catalog (temp_sensor_calibration.dat)
→ Recommendation: Add as CI-SRC-005 or move to test data directory
Version Numbering and Tagging
Semantic Versioning
All releasable artifacts follow Semantic Versioning (SemVer) 2.0.0:
MAJOR.MINOR.PATCH[-prerelease][+build]
| Component | When to Increment | Example |
|---|---|---|
| MAJOR | Incompatible changes to external interfaces; safety classification changes | 2.0.0 to 3.0.0 |
| MINOR | New functionality added in a backward-compatible manner | 2.1.0 to 2.2.0 |
| PATCH | Backward-compatible bug fixes | 2.1.0 to 2.1.1 |
| Pre-release | Release candidates, alpha/beta builds | 3.0.0-RC1, 3.0.0-beta.2 |
| Build metadata | CI build number, commit SHA (informational only) | 3.0.0+build.1847 |
Tag Convention
Git tags serve as the authoritative version markers and baseline identifiers:
| Tag Pattern | Purpose | Example |
|---|---|---|
v{MAJOR}.{MINOR}.{PATCH} |
Release tag (product baseline) | v3.0.0 |
v{MAJOR}.{MINOR}.{PATCH}-RC{N} |
Release candidate (development baseline) | v3.0.0-RC1 |
bl-{type}-{version} |
Non-release baseline (functional, allocated, design) | bl-functional-2.0 |
AI Enforcement: The CI pipeline validates that release tags follow the SemVer pattern and that the VERSION file contents match the tag. Mismatches block the release pipeline.
Storage and Access Control
Repository Structure
A well-organized repository structure supports CI identification and access control:
bcm-project/
├── src/ # Source code CIs
│ ├── app/ # CI-SRC-001: Application layer
│ ├── mcal/ # CI-SRC-002: MCAL configuration
│ ├── bsp/ # CI-SRC-003: Board support package
│ └── driver/ # CI-SRC-004: Device drivers
├── test/ # Test CIs
│ ├── unit/ # CI-TEST-001: Unit tests
│ ├── integration/ # CI-TEST-002: Integration tests
│ └── fixtures/ # Test data and fixtures
├── architecture/ # Architecture CIs
│ ├── system_arch.eap # CI-ARCH-001
│ └── sw_arch/ # CI-ARCH-002
├── docs/ # Documentation CIs
│ ├── safety/ # CI-DOC-001: Safety manual
│ └── design/ # Design documents
├── models/ # ML model CIs (Git LFS)
│ └── *.engine # CI-ML-001
├── tools/ # Build configuration CIs
│ └── cmake/ # CI-BUILD-001
├── scripts/ # CI/CD and automation scripts
├── .gitlab-ci.yml # CI-BUILD-002: Pipeline definition
├── CHANGELOG.md # CI-DOC-002: Release notes
├── VERSION # Version file
└── .pre-commit-config.yaml # Pre-commit hook configuration
Access Control Matrix
| Role | main | develop | feature/* | release/* | CI Catalog | Baseline Approval |
|---|---|---|---|---|---|---|
| Configuration Manager | Read + Tag | Read | Read | Read + Tag | Read + Write | Approve |
| SW Lead | Read | Read + Merge | Read + Write | Read + Merge | Read | Review |
| Developer | Read | Read | Read + Write (own) | Read | Read | None |
| QA Lead | Read | Read | Read | Read | Read | Approve |
| Safety Manager | Read | Read | Read | Read | Read | Approve (safety CIs) |
| DevOps | Read + Deploy | Read | Read | Read + Deploy | Read + Write | None |
HITL Protocol for Configuration Management
Human-in-the-Loop controls ensure that AI automation does not compromise the integrity of configuration management decisions.
HITL Gate Definitions
| Gate | Stage | Human Action Required | AI Contribution |
|---|---|---|---|
| G1: CI Catalog Update | New CI identified | Human confirms CI should be tracked; assigns owner, classification, and change control level | AI discovers untracked files; suggests classification based on file type and location |
| G2: Merge Approval | Code change ready for integration | Reviewer confirms code quality, traceability, and test coverage | AI validates commit convention, runs static analysis, checks test pass/fail |
| G3: Baseline Approval | Baseline snapshot requested | Configuration Manager and designated approvers sign off | AI generates consistency report; verifies all CIs present at correct versions |
| G4: Release Decision | Baseline ready for production | Project Manager, QA Lead, and Safety Manager authorize release | AI confirms build reproducibility, test completeness, and compliance evidence |
| G5: Anomaly Resolution | Unauthorized change detected | Human investigates and resolves the anomaly; documents corrective action | AI detects the anomaly (direct push, convention violation, unauthorized CI modification) |
Escalation Rules
| Condition | Escalation Action | Responsible |
|---|---|---|
| Direct push to protected branch detected | Immediate notification to Configuration Manager and SW Lead; commit flagged for review | AI monitoring |
| Baseline consistency check fails | Block baseline creation; notify Configuration Manager with detailed failure report | AI gate + Configuration Manager |
| CI catalog completeness below 95% | Warning in CM status report; notification to Configuration Manager | AI reporting |
| Build not reproducible from baseline tag | Block release; escalate to DevOps and Configuration Manager | AI verification + DevOps |
| Safety-relevant CI modified without CR linkage | Block merge; escalate to Safety Manager | AI gate + Safety Manager |
Multi-Standard Mapping
SUP.8 Configuration Management aligns with and supports compliance across multiple safety and quality standards:
| Standard | CM Requirement | SUP.8 BP Mapping | AI Support |
|---|---|---|---|
| ISO 26262 (Part 8, Clause 7) | Configuration management of safety-related items; baseline management; change management of safety work products | BP1-BP5 | AI tracks ASIL classification of CIs; flags safety-relevant changes for mandatory safety review |
| ISO/SAE 21434 (Clause 7.4) | Configuration management for cybersecurity work products; protection of security-sensitive artifacts | BP1-BP5 | AI monitors access to security CIs; detects unauthorized exposure of cryptographic material |
| IEC 61508 (Part 1, Clause 6) | Configuration management plan; version control; baseline management | BP1-BP5 | AI validates SIL-relevant CI traceability |
| DO-178C (Section 7.2) | Software configuration management; problem reporting; change control | BP1-BP5 | AI enforces DO-178C-specific CI naming conventions and evidence packaging |
| CMMI (CM Process Area) | Configuration identification, control, status accounting, audits | BP1-BP5 | AI generates CMMI-style CM audit reports |
Metrics and KPIs
Process Metrics
| Metric | Definition | Target | Measurement Method |
|---|---|---|---|
| CI Catalog Completeness | Percentage of repository artifacts tracked in the CI catalog | > 98% | AI CI discovery scan vs. catalog comparison |
| Baseline Consistency Score | Percentage of CIs in a baseline that pass all consistency checks | 100% for release baselines | AI consistency verification report |
| Build Reproducibility Rate | Percentage of baselines that can be exactly rebuilt from source | 100% | Automated rebuild and SHA comparison |
| Convention Compliance Rate | Percentage of commits following naming and message conventions | > 95% | Pre-commit hook rejection rate analysis |
| Merge Request Review Time | Average time from MR creation to merge or rejection | < 2 business days | ALM timestamp analysis |
| Unauthorized Change Rate | Number of changes bypassing defined CM controls per month | 0 | AI anomaly detection count |
AI Effectiveness Metrics
| Metric | Definition | Target | Measurement Method |
|---|---|---|---|
| CI Discovery Accuracy | Percentage of AI-recommended CIs confirmed as correct by human review | > 90% | Human confirmation rate of AI suggestions |
| Baseline Check Speed | Time for AI to complete consistency verification vs. manual verification | > 80% reduction | Automated timing comparison |
| Anomaly Detection Precision | Percentage of AI-flagged anomalies that are true anomalies | > 85% | Human review of flagged items |
| Report Generation Time | Time from request to delivered CM status report | < 5 minutes (automated) | Automated timing |
Work Products
| WP ID | Work Product | Description | AI Role |
|---|---|---|---|
| 06-01 | CM plan | Documents the CM strategy, tools, procedures, and roles for the project | Strategy templates; tool configuration scaffolding |
| 06-02 | Baseline report | Records the contents, versions, and approval status of each baseline | Consistency checking; automated report generation |
| 06-03 | CM status report | Periodic report on CI inventory, modification activity, and compliance | Automated generation; anomaly detection; trend analysis |
| 06-04 | CI catalog | Master inventory of all configuration items with classification and ownership | AI-assisted discovery; completeness monitoring |
| 08-14 | Baseline approval record | Formal record of baseline approval with signatures and conditions | AI prepares consistency evidence; human approves |
Implementation Checklist
Use this checklist when establishing or improving SUP.8 Configuration Management with AI integration.
Process Setup
- Define CM strategy and document in the CM plan (BP1)
- Establish version control repository with defined branching strategy
- Configure branch protection rules for main, develop, and release branches
- Define and document commit message convention
- Establish CI catalog with all known work products classified and assigned to owners
- Define baseline types, creation triggers, and approval workflows
- Assign Configuration Manager role with defined responsibilities
- Define access control matrix for repository and baseline operations
AI Integration
- Deploy pre-commit hooks for convention enforcement (commit messages, branch names, binary detection)
- Configure CI pipeline with CM validation stage (convention checks, traceability validation)
- Implement AI CI discovery scanner to detect untracked artifacts
- Set up automated baseline consistency verification
- Configure automated CM status report generation
- Implement anomaly detection for unauthorized changes to protected branches and CIs
- Set up build reproducibility verification in release pipeline
Tool Integration
- Connect version control to ALM tool for CR-to-commit traceability
- Configure merge request templates with CM metadata fields
- Set up Git LFS for binary artifacts (ML models, large test data)
- Configure artifact storage for release packages and compliance evidence
- Implement dashboard views for CI inventory, baseline status, and compliance score
HITL and Governance
- Document HITL gates (G1-G5) in the CM plan
- Define escalation rules for anomalies, failed baselines, and convention violations
- Establish baseline approval workflow with required signatories
- Train team on CM procedures, commit conventions, and merge request process
- Schedule periodic CM audits (internal and for external assessment readiness)
Summary
SUP.8 Configuration Management:
- AI Level: L2-L3 (high automation in CI/CD validation and reporting; human authority for baselines and releases)
- Primary AI Value: Automated convention enforcement, CI discovery, baseline consistency verification, status reporting, anomaly detection
- Human Essential: Baseline approval, release decisions, CI catalog ownership, anomaly resolution
- Key Outputs: CM plan, CI catalog, baselines, CM status reports, baseline approval records
- Integration: Connects version control, ALM, CI/CD, and artifact storage systems
- HITL Protocol: Five defined gates (G1-G5) ensuring human authority over all CM decisions that affect product integrity
- Focus: Integrity, traceability, reproducibility