Configuration management policy

The configuration management policy establishes rules to ensure that changes to the information system are minimally disruptive to the functioning of the information system and the users that it supports. The configuration management policy also establishes rules that require IT professionals to document and track changes to an information system.

What the configuration management policy should address:

  • Establishing and maintaining baseline configurations and inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles
  • Establishing and enforcing security configuration settings for information technology products employed in organizational information systems
  • Tracking, reviewing, approving/disapproving, and auditing changes to information systems
  • Analyzing the security impact of changes prior to implementation
  • Defining, documenting, approving, and enforcing physical and logical access restrictions associated with changes to the information system
  • Employing the principle of least functionality by configuring the information system to provide only essential capabilities
  • Restricting, disabling, and preventing the use of non-essential programs, functions, ports, protocols, and services
  • Applying deny-by-exception (blacklisting) policies to prevent the use of unauthorized software or deny all, permit-by-exception (whitelisting) policies, to allow the execution of authorized software
  • Controlling and monitoring user-installed software
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.152.162