1.3 : Change Management Flashcards
Explain the importance of change management processes and the impact to security
Approval Process
The formal procedure to obtain authorization before implementing changes, ensuring that all changes are reviewed and approved by the appropriate parties.
Ownership
Responsibility assigned to an individual or group to manage and oversee changes, ensuring accountability and proper implementation.
Stakeholders
Individuals or groups who are affected by or have an interest in the change. They provide input and approval, ensuring that the change meets the needs of the organization.
Impact Analysis
Assessing the potential effects of a change on systems, processes, and business operations. This helps in identifying risks and planning mitigations.
Test Results
The outcomes of testing a change in a controlled environment to ensure it works as intended and does not introduce new issues.
Backout Plan
A strategy for reverting a change if it causes unexpected problems, allowing systems to be restored to their original state.
Maintenance Window
A scheduled time period during which systems can be taken offline or modified with minimal impact on business operations.
Standard Operating Procedure (SOP)
A set of written instructions that describe the routine processes to be followed during change management, ensuring consistency and compliance.
Allow Lists/Deny Lists
Lists that specify which entities (e.g., IP addresses, applications) are permitted or denied access to a resource, helping control security and traffic.
Restricted Activities
Actions that are limited or prohibited during certain operations or times to reduce risk and maintain security.
Downtime
The period when a system is unavailable, often due to maintenance or unexpected outages. Planning and minimizing downtime is crucial for maintaining service continuity.
Service Restart
Rebooting or restarting a service as part of maintenance or after changes, ensuring that updates take effect or issues are resolved.
Application Restart
Restarting an application to apply changes or updates, ensuring that new configurations are loaded and operational.
Legacy Applications
Older software systems that may not be fully supported or compatible with newer technologies, requiring special considerations during changes.
Dependencies
Interdependencies between systems or applications that must be considered during changes to prevent disruptions or failures.