Exam Objectives 1.3
Explain the importance of change management processes and the impact to security.
- Business processes impacting security operation:
- Approval process: Having the project and budget authorized
- Ownership: Someone who is responsible for a security task
- Stakeholders: People who own shares or invest money into the company
- Impact analysis: Consider the implications of any change
- Test results: Testing new security measures
- Backout plan: Having a rollback option
- Maintenance window: Where scheduled changes are implemented
- Standard operating procedure: Rulebook on how to carry out tasks
- Technical implications:
- Allow lists/deny lists: Allow or deny a user/device
- Restricted activities: Activities that can cause harm
- Downtime: Impacts a pause in activities
- Service restart: Can cause disruption to a system
- Application restart: Weakness that can emerge on restart
- Legacy applications: Vulnerabilities on older applications no longer supported
- Dependencies: Services, system drivers...