Search results
Jump to navigation
Jump to search
Page title matches
- ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can ...7 KB (942 words) - 15:09, 23 March 2007
- ==Software Configuration Management== ...re at discrete points in time and to systematically control changes to the configuration for the purpose of maintaining software integrity, traceability, and accoun ...22 KB (3,132 words) - 19:07, 17 April 2007
- ==Sample Configuration Management Standard== ...e objectives established in the [[Sample_Asset_Management_Policy:|'''Asset Management Standard''']], and provides specific instructions and requirements for esta ...5 KB (681 words) - 21:56, 15 January 2014
Page text matches
- '''DS 9.2 Identification and Maintenance of Configuration Items '''<br> ...rized changes, and assist in the verification and recording of the current configuration ...3 KB (429 words) - 18:55, 25 June 2006
- ==Configuration Management== ...erver, or as complex as the entire IT department. In large organizations a configuration manager may be appointed to oversee and manage the CM process. ...4 KB (570 words) - 16:12, 23 March 2007
- ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can ...7 KB (942 words) - 15:09, 23 March 2007
- ::'''2. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit un ...ct an evaluation of the frequency and timeliness of management’s review of configuration records. ...2 KB (324 words) - 18:46, 25 June 2006
- Determine if the management of third-party services has been assigned to appropriate individuals.<br> ...t color=#008000>The BackupSystemAudit utility discovers and records system configuration information such as: ...3 KB (335 words) - 14:05, 26 February 2007
- ==Sample Configuration Management Standard== ...e objectives established in the [[Sample_Asset_Management_Policy:|'''Asset Management Standard''']], and provides specific instructions and requirements for esta ...5 KB (681 words) - 21:56, 15 January 2014
- [[DS1.1:| 1.1 Service Level Management Framework]]<br> [[DS2.2:| 2.2 Supplier Relationship Management]]<br> ...4 KB (538 words) - 19:08, 14 June 2007
- '''DS 9.1 Configuration Repository and Baseline '''<br> ...rized changes, and assist in the verification and recording of the current configuration. ...4 KB (506 words) - 18:44, 25 June 2006
- '''DS 10.4 Integration of Change, Configuration and Problem Management '''<br> ...ents, integrate the related processes of change, configuration and problem management. Monitor how much effort is applied to firefighting rather than enabling bu ...2 KB (248 words) - 17:50, 5 May 2006
- ...upport the objectives established in the Asset Protection Policy and Asset Management Policy.<br> :1. [[Sample Life Cycle Management Standard:|'''Sample ISO Life Cycle Management Standard''']]<br> ...5 KB (613 words) - 18:14, 25 July 2006
- ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...4 KB (588 words) - 16:23, 21 March 2007
- ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...6 KB (885 words) - 10:12, 23 March 2007
- ==Sample Asset Management Standard== ...ard defines Company objectives for establishing specific standards for the management of the networks, systems, and applications that store, process and transmit ...3 KB (389 words) - 17:40, 14 January 2014
- ==Service Desk Management== A '''Service Desk''' is a primary IT capability called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] ...4 KB (552 words) - 16:15, 20 March 2007
- '''AI 2.5 Configuration and Implementation of Acquired Application Software'''<br> ...rized changes, and assist in the verification and recording of the current configuration. ...4 KB (501 words) - 18:24, 25 June 2006
- ...) that are needed to create, implement, and maintain a best practice, risk management-based information security program.<br> ...) that are needed to create, implement, and maintain a best practice, risk management-based Information Security Program.<br> ...5 KB (705 words) - 11:39, 30 May 2015
- ...I-6.3.1:|PCI-6.3.1 Testing of all security patches and system and software configuration changes before deployment.]]<br> :'''PCI-6.4 Follow change control procedures for all system and software configuration changes.'''<br> ...4 KB (578 words) - 18:46, 28 February 2007
- [[Asset Management:|'''Asset Management''']]<br> [[Communications and Operations Management:|'''Communications and Operations Management''']]<br> ...3 KB (378 words) - 21:27, 18 January 2015
- <br>Ensure that security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and ...puter operations, which are periodically reviewed, updated and approved by management.<br> ...6 KB (781 words) - 12:31, 23 June 2006
- :[[Sample Asset Management Policy:|'''Sample Asset Management Policy''']]<br> :The Asset Management Policy defines objectives for properly managing Information Technology infr ...3 KB (404 words) - 14:53, 25 July 2006