官术网_书友最值得收藏!

Configuration management policy

The configuration management policy establishes rules to ensure that changes to the information system are minimally disruptive to the functioning of the information system and the users that it supports. The configuration management policy also establishes rules that require IT professionals to document and track changes to an information system.

What the configuration management policy should address:

  • Establishing and maintaining baseline configurations and inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles
  • Establishing and enforcing security configuration settings for information technology products employed in organizational information systems
  • Tracking, reviewing, approving/disapproving, and auditing changes to information systems
  • Analyzing the security impact of changes prior to implementation
  • Defining, documenting, approving, and enforcing physical and logical access restrictions associated with changes to the information system
  • Employing the principle of least functionality by configuring the information system to provide only essential capabilities
  • Restricting, disabling, and preventing the use of non-essential programs, functions, ports, protocols, and services
  • Applying deny-by-exception (blacklisting) policies to prevent the use of unauthorized software or deny all, permit-by-exception (whitelisting) policies, to allow the execution of authorized software
  • Controlling and monitoring user-installed software
主站蜘蛛池模板: 石渠县| 广宗县| 屯昌县| 巫山县| 余庆县| 平武县| 来宾市| 鹤山市| 洪湖市| 页游| 赣州市| 西城区| 台中市| 阳春市| 鞍山市| 大宁县| 略阳县| 蓬溪县| 缙云县| 榆中县| 定南县| 姜堰市| 纳雍县| 历史| 洛宁县| 中宁县| 佳木斯市| 潞西市| 靖宇县| 阳江市| 黔江区| 若尔盖县| 界首市| 栖霞市| 普兰县| 克拉玛依市| 西吉县| 山丹县| 泸西县| 门头沟区| 元江|