- Information Security Handbook
- Darren Death
- 193字
- 2021-07-02 21:55:56
Configuration management policy
The configuration management policy establishes rules to ensure that changes to the information system are minimally disruptive to the functioning of the information system and the users that it supports. The configuration management policy also establishes rules that require IT professionals to document and track changes to an information system.
What the configuration management policy should address:
- Establishing and maintaining baseline configurations and inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles
- Establishing and enforcing security configuration settings for information technology products employed in organizational information systems
- Tracking, reviewing, approving/disapproving, and auditing changes to information systems
- Analyzing the security impact of changes prior to implementation
- Defining, documenting, approving, and enforcing physical and logical access restrictions associated with changes to the information system
- Employing the principle of least functionality by configuring the information system to provide only essential capabilities
- Restricting, disabling, and preventing the use of non-essential programs, functions, ports, protocols, and services
- Applying deny-by-exception (blacklisting) policies to prevent the use of unauthorized software or deny all, permit-by-exception (whitelisting) policies, to allow the execution of authorized software
- Controlling and monitoring user-installed software
推薦閱讀
- 數據展現的藝術
- 高性能混合信號ARM:ADuC7xxx原理與應用開發
- ETL with Azure Cookbook
- Java實用組件集
- Google App Inventor
- 人工智能工程化:應用落地與中臺構建
- Python Algorithmic Trading Cookbook
- STM32G4入門與電機控制實戰:基于X-CUBE-MCSDK的無刷直流電機與永磁同步電機控制實現
- Windows環境下32位匯編語言程序設計
- 網絡組建與互聯
- 數據通信與計算機網絡
- Docker on Amazon Web Services
- C++程序設計基礎(上)
- Python文本分析
- Natural Language Processing and Computational Linguistics