Section 12.111 Technical Implications of Changes Flashcards
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
Technical Implications of Changes
Allow List
Allow Lists and Deny Lists
Specifies entities permitted to access a resource
● Review both lists when proposing changes to prevent unintended access restrictions or grants
● Essential for maintaining system functionality and security
Technical Implications of Changes
Deny List
Allow Lists and Deny Lists
Lists entities prevented from accessing a resource
● Review both lists when proposing changes to prevent unintended access restrictions or grants
● Essential for maintaining system functionality and security
Restricted Activities
● Certain tasks labeled as ‘restricted’ due to their impact on system health
or security
● Verify proposed changes for any restricted activities
● Prevent data breaches and operational disruptions by understanding
restrictions
Downtime
● Any change, even minor, carries the risk of causing downtime
● Estimate potential downtime and assess its negative effects against
benefits
● Schedule changes during maintenance windows to minimise impacts on
end users
Service and Application Restarts
● Some changes, like installing security patches, require service or application restarts
● Restarting critical services can be disruptive, potentially causing data loss or backlog
● Consider the implications of restarts, especially for key servers
Legacy Applications
● Older software or systems still in use due to functionality and user needs
● Legacy applications are less flexible and more sensitive to changes
● Minor updates can lead to malfunctions or crashes, so assess their
compatibility.
Dependencies
● Interconnected systems create dependencies, where changes in one area affect others
● Mapping dependencies is crucial before implementing changes
● Prevents cascading effects, outages, or disruptions in various parts of
your network