Configuration Management Procedure

Configuration Management Procedure

The objective of the Configuration Management Procedure is to ensure the integrity and availability of Company information and to prevent damages from uncontrolled configuration changes to all IT and physical infrastructure services that support Company’s systems.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
3.1 CONFIGURATION IDENTIFICATION AND CONFIGURATION ITEMS
3.2 CONFIGURATION MANAGEMENT DATABASE
3.3 CONFIGURATION CONTROL
3.4 CONFIGURATION STANDARDS
3.5 CONFIGURATION VERIFICATION AND AUDIT
4. ROLES AND RESPONSIBILITIES
4.1 INFORMATION TECHNOLOGY AND COMMUNICATION DIVISION
4.2 INFORMATION SECURITY SECTOR
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 9

Review Configuration Management Procedure.

Your email address will not be published. Required fields are marked *

Related Products:

€1,069.99

Purchase

This bundle contains all the products listed in the Program Development and Change Management section. Take advantage of the 25% OFF when buying the bundle!

€49.99

Purchase

The Public Cloud Security Standard (the Standard) establishes security requirements and controls to maintain the Confidentiality, integrity, and availability of the Company’s data in the public cloud.

€49.99

Purchase

The objective of this policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to Company’s organization network for business purposes.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link