The objective of the Configuration Management Procedure is to ensure the integrity and availability of Company information and to prevent damages from uncontrolled configuration changes to all IT and physical infrastructure services that support Company’s systems.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3.1 CONFIGURATION IDENTIFICATION AND CONFIGURATION ITEMS
3.2 CONFIGURATION MANAGEMENT DATABASE
3.3 CONFIGURATION CONTROL
3.4 CONFIGURATION STANDARDS
3.5 CONFIGURATION VERIFICATION AND AUDIT
4. ROLES AND RESPONSIBILITIES
4.1 INFORMATION TECHNOLOGY AND COMMUNICATION DIVISION
4.2 INFORMATION SECURITY SECTOR
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
This bundle contains all the products listed in the Program Development and Change Management section. Take advantage of the 25% OFF when buying the bundle!
The Public Cloud Security Standard (the Standard) establishes security requirements and controls to maintain the Confidentiality, integrity, and availability of the Company’s data in the public cloud.
The objective of this policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to Company’s organization network for business purposes.