Section 12.111 Technical Implications of Changes Flashcards

Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.

1
Q

Technical Implications of Changes

Allow List

Allow Lists and Deny Lists

A

Specifies entities permitted to access a resource

● Review both lists when proposing changes to prevent unintended access restrictions or grants

● Essential for maintaining system functionality and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Technical Implications of Changes

Deny List

Allow Lists and Deny Lists

A

Lists entities prevented from accessing a resource

● Review both lists when proposing changes to prevent unintended access restrictions or grants

● Essential for maintaining system functionality and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Restricted Activities

A

● Certain tasks labeled as ‘restricted’ due to their impact on system health
or security

● Verify proposed changes for any restricted activities

● Prevent data breaches and operational disruptions by understanding
restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Downtime

A

● Any change, even minor, carries the risk of causing downtime

● Estimate potential downtime and assess its negative effects against
benefits

● Schedule changes during maintenance windows to minimise impacts on
end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Service and Application Restarts

A

● Some changes, like installing security patches, require service or application restarts

● Restarting critical services can be disruptive, potentially causing data loss or backlog

● Consider the implications of restarts, especially for key servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legacy Applications

A

● Older software or systems still in use due to functionality and user needs

● Legacy applications are less flexible and more sensitive to changes

● Minor updates can lead to malfunctions or crashes, so assess their
compatibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dependencies

A

● Interconnected systems create dependencies, where changes in one area affect others

● Mapping dependencies is crucial before implementing changes

● Prevents cascading effects, outages, or disruptions in various parts of
your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly