Chapter 8 Flashcards
Change and Configuration management:
1. CM Initial process
Full asset inventory
codification of the baseline
secure baseline build
Deployment of new assets
Change and Configuration management:
2.CM Normal operational mode
CMB meetings
CM Testing
Deployment
Documentation
Release and deployment management:
Release management
release management (RM) is a software engineering process concerned with arranging all required elements to successfully, repeatably, and verifiably deploy new software versions.
Release and deployment management:
DevOps Security
-DevOps
-CI/CD
-Security automation in CI/CD Incl administrative and technical controls
ISO 20000-1
can be used to manage ITSM using a variety of approaches, including ITIL and the ISACA COBIT framework.
IT IL(IT Service management) and continual service improvement
Business Continuity and Disaster Recovery
Business continuity efforts are concerned with maintaining critical operations during any interruption in service,
disaster recovery efforts are focused on the resumption of operations after an interruption due to disaster
disaster recovery efforts are focused on the resumption of operations after an interruption due to disaster
Continuity of Operations
After we’ve seen to health and human safety concerns, our primary business focus should be continuity of critical operations.
BC/DR Planning
Critical asset inventory
disaster criteria
disaster declaration process
essential points of contact
detailed actions, tasks and activities
BC/DR Tool kit
7 step continual improvement model
what is the vision / goal
where are we?
where do we want to go?
how do we get there?
take action
did we get there ? review results
ITIL v4 describes three subprocesses related to availability management
Designing services for availability, availability testing, and availability monitoring and reporting
DHCP server is a Dynamic Host Configuration Protocol (DHCP) server
DHCP server is a Dynamic Host Configuration Protocol (DHCP) server is a network service that automatically assigns IP addresses and other network settings to devices on a network
A default gateway, subnet mask, DNS server, and IP address
5 Stages of a Digital Forensics Investigation
Stage 1: Identification. …
Stage 2: Collection. …
Stage 3: Analysis. …
Stage 4: Reporting. …
Stage 5: Presentation. …
IaaS - Hypervisor
In an Infrastructure-as-a-Service (IaaS) model, the cloud service provider (CSP) owns and manages the hypervisor: