1.3 : Change Management Flashcards

Explain the importance of change management processes and the impact to security

1
Q

Approval Process

A

The formal procedure to obtain authorization before implementing changes, ensuring that all changes are reviewed and approved by the appropriate parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ownership

A

Responsibility assigned to an individual or group to manage and oversee changes, ensuring accountability and proper implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stakeholders

A

Individuals or groups who are affected by or have an interest in the change. They provide input and approval, ensuring that the change meets the needs of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Impact Analysis

A

Assessing the potential effects of a change on systems, processes, and business operations. This helps in identifying risks and planning mitigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Test Results

A

The outcomes of testing a change in a controlled environment to ensure it works as intended and does not introduce new issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backout Plan

A

A strategy for reverting a change if it causes unexpected problems, allowing systems to be restored to their original state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Maintenance Window

A

A scheduled time period during which systems can be taken offline or modified with minimal impact on business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Standard Operating Procedure (SOP)

A

A set of written instructions that describe the routine processes to be followed during change management, ensuring consistency and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Allow Lists/Deny Lists

A

Lists that specify which entities (e.g., IP addresses, applications) are permitted or denied access to a resource, helping control security and traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Restricted Activities

A

Actions that are limited or prohibited during certain operations or times to reduce risk and maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Downtime

A

The period when a system is unavailable, often due to maintenance or unexpected outages. Planning and minimizing downtime is crucial for maintaining service continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Service Restart

A

Rebooting or restarting a service as part of maintenance or after changes, ensuring that updates take effect or issues are resolved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Restart

A

Restarting an application to apply changes or updates, ensuring that new configurations are loaded and operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legacy Applications

A

Older software systems that may not be fully supported or compatible with newer technologies, requiring special considerations during changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dependencies

A

Interdependencies between systems or applications that must be considered during changes to prevent disruptions or failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Updating Diagrams

A

Modifying network or system diagrams to reflect changes, ensuring that documentation is accurate and up to date.

17
Q

Updating Policies/Procedures

A

Revising organizational policies and procedures to incorporate changes, ensuring ongoing compliance and effective operation.

18
Q

Version Control

A

The process of managing changes to documents, configurations, and software, allowing for tracking of revisions and rollback if necessary.

19
Q

Change Management

A

Plans, implements, and monitors changes to protect organizations from unforseen consequences

20
Q

Technical Implications of Change Management

(List all)

A
  • Allow lists/deny lists
  • Restricted activities
  • Downtime
  • Service restart
  • Application restart
  • Legacy applications
  • Dependencies