Search results

Jump to navigation Jump to search

Page title matches

  • ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can
    7 KB (942 words) - 15:09, 23 March 2007
  • ==Software Configuration Management== ...re at discrete points in time and to systematically control changes to the configuration for the purpose of maintaining software integrity, traceability, and accoun
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ==Sample Configuration Management Standard== ...e objectives established in the [[Sample_Asset_Management_Policy:|'''Asset Management Standard''']], and provides specific instructions and requirements for esta
    5 KB (681 words) - 21:56, 15 January 2014

Page text matches

  • '''DS 9.2 Identification and Maintenance of Configuration Items '''<br> ...rized changes, and assist in the verification and recording of the current configuration
    3 KB (429 words) - 18:55, 25 June 2006
  • ==Configuration Management== ...erver, or as complex as the entire IT department. In large organizations a configuration manager may be appointed to oversee and manage the CM process.
    4 KB (570 words) - 16:12, 23 March 2007
  • ==Configuration Management == ...re or software upgrade, a computer technician can access the configuration management program and database to see what is currently installed. The technician can
    7 KB (942 words) - 15:09, 23 March 2007
  • ::'''2. Risk: Insufficient configuration controls can lead to security and availability exposures that may permit un ...ct an evaluation of the frequency and timeliness of management’s review of configuration records.
    2 KB (324 words) - 18:46, 25 June 2006
  • Determine if the management of third-party services has been assigned to appropriate individuals.<br> ...t color=#008000>The BackupSystemAudit utility discovers and records system configuration information such as:
    3 KB (335 words) - 14:05, 26 February 2007
  • ==Sample Configuration Management Standard== ...e objectives established in the [[Sample_Asset_Management_Policy:|'''Asset Management Standard''']], and provides specific instructions and requirements for esta
    5 KB (681 words) - 21:56, 15 January 2014
  • [[DS1.1:| 1.1 Service Level Management Framework]]<br> [[DS2.2:| 2.2 Supplier Relationship Management]]<br>
    4 KB (538 words) - 19:08, 14 June 2007
  • '''DS 9.1 Configuration Repository and Baseline '''<br> ...rized changes, and assist in the verification and recording of the current configuration.
    4 KB (506 words) - 18:44, 25 June 2006
  • '''DS 10.4 Integration of Change, Configuration and Problem Management '''<br> ...ents, integrate the related processes of change, configuration and problem management. Monitor how much effort is applied to firefighting rather than enabling bu
    2 KB (248 words) - 17:50, 5 May 2006
  • ...upport the objectives established in the Asset Protection Policy and Asset Management Policy.<br> :1. [[Sample Life Cycle Management Standard:|'''Sample ISO Life Cycle Management Standard''']]<br>
    5 KB (613 words) - 18:14, 25 July 2006
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien
    4 KB (588 words) - 16:23, 21 March 2007
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as
    6 KB (885 words) - 10:12, 23 March 2007
  • ==Sample Asset Management Standard== ...ard defines Company objectives for establishing specific standards for the management of the networks, systems, and applications that store, process and transmit
    3 KB (389 words) - 17:40, 14 January 2014
  • ==Service Desk Management== A '''Service Desk''' is a primary IT capability called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]]
    4 KB (552 words) - 16:15, 20 March 2007
  • '''AI 2.5 Configuration and Implementation of Acquired Application Software'''<br> ...rized changes, and assist in the verification and recording of the current configuration.
    4 KB (501 words) - 18:24, 25 June 2006
  • ...) that are needed to create, implement, and maintain a best practice, risk management-based information security program.<br> ...) that are needed to create, implement, and maintain a best practice, risk management-based Information Security Program.<br>
    5 KB (705 words) - 11:39, 30 May 2015
  • ...I-6.3.1:|PCI-6.3.1 Testing of all security patches and system and software configuration changes before deployment.]]<br> :'''PCI-6.4 Follow change control procedures for all system and software configuration changes.'''<br>
    4 KB (578 words) - 18:46, 28 February 2007
  • [[Asset Management:|'''Asset Management''']]<br> [[Communications and Operations Management:|'''Communications and Operations Management''']]<br>
    3 KB (378 words) - 21:27, 18 January 2015
  • <br>Ensure that security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, and ...puter operations, which are periodically reviewed, updated and approved by management.<br>
    6 KB (781 words) - 12:31, 23 June 2006
  • :[[Sample Asset Management Policy:|'''Sample Asset Management Policy''']]<br> :The Asset Management Policy defines objectives for properly managing Information Technology infr
    3 KB (404 words) - 14:53, 25 July 2006

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)