Technical Change Management Flashcards

1
Q

Allow list/deny list

A

Allow list - nothing runs unless it’s approved, very restrictive list. Controlled by security policy.
Deny list- more flexible than allow list,you can run every application you would like except this specifically named no the deny list, may be identified by anty-malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Restricted activities

A

Specifically defined in scope of change, anything else cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Downtime during change

A

Downtime is the time when services are unavailable. But during change time services can be just disruptive. That’s why change usually is scheduled during non-production hours. Downtime should be prevent, when you are working 24/7 during change it is good to switch to the secondary system, upgrade primarily system then switch back. To minimize downtime - change process should be automates as much as possible, switch back to secondary system if issue paper must be secured. . Should be a part of the backout plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Downtime during change

A

Downtime is the time when services are unavailable. But during change time services can be just disruptive. That’s why change usually is scheduled during non-production hours. Downtime should be prevent, when you are working 24/7 during change it is good to switch to the secondary system, upgrade primarily system then switch back. To minimize downtime - change process should be automates as much as possible, switch back to secondary system if issue paper must be secured. . Should be a part of the backout plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Legacy applications change

A

Legacy apps are running by long time , often no longer supported by the developer, for example WindowsXP,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly