Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...hat production data (real credit card numbers) is not used for testing and development purposes, or is sanitized before use.<br> ...
    2 KB (316 words) - 18:30, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...'' There is a separation of duties between those personnel assigned to the development/test environments and those assigned to the production environment.<br> ...
    2 KB (307 words) - 18:29, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ::'''PCI-6.3.2:''' The test/development environments are separate from the production environment, with access cont ...
    2 KB (304 words) - 18:28, 28 February 2007
  • :'''Obtain and review written software development processes to confirm they are based on industry standards and that security :From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio ...
    2 KB (298 words) - 18:26, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio '''Control Stewards Process Narrative''' ...
    2 KB (297 words) - 18:33, 28 February 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio '''Control Stewards Process Narrative''' ...
    2 KB (304 words) - 18:36, 28 February 2007
  • ...y right problems, and unit sales that are less than forecasted; unexpected development costs also create risk that can be in the form of more rework than anticipa ...er probabilities of scenarios have been calculated with risk analysis, the process of risk management can be applied to help manage the risk. ...
    1 KB (215 words) - 18:32, 13 April 2007
  • ...e cycle. From review of written software development processes, inquiry of software developers, and review of relevant data (network configuration documentatio '''Control Stewards Process Narrative''' ...
    2 KB (334 words) - 18:37, 28 February 2007
  • :::a. [[SOX.1.3:|'''SOX.1.3''']] IT management implements system software that does not jeopardize the security of the data and programs being stored ...ermine that a risk assessment of the potential impact of changes to system software is performed. ...
    2 KB (303 words) - 19:58, 23 June 2006
  • ...ications, numerous vulnerabilities can be avoided by using standard system development processes and secure coding techniques.<br> :'''PCI-6.1 Ensure that all system components and software have the latest vendor-supplied security patches.'''<br> ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...propriate steps so that application controls are considered throughout the development or acquisition life cycle, e.g., application controls should be included in ...
    3 KB (354 words) - 13:39, 22 June 2006
  • '''PO 8.3 Development and Acquisition Standards'''<br> ...nteroperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; and unit, regress ...
    6 KB (863 words) - 13:12, 23 June 2006
  • ...n associated with [[ITIL]], but the origins of Change as an IT management process predate ITIL considerably, at least according to the IBM publication "A Man ==Change Management in Development Projects== ...
    4 KB (588 words) - 16:23, 21 March 2007
  • '''AI 2.7 Development of Application Software'''<br> ...legal and contractual aspects are identified and addressed for application software developed by third parties.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • Follow a similar development process as for the development of new systems in the event of major changes to existing systems that resul ::'''1. Risk: The impact of application system changes (e.g., hardware and software) should be evaluated and adjusted to ensure ongoing availability, performan ...
    3 KB (425 words) - 13:19, 23 June 2006
  • '''AI 7.9 Software Release'''<br> Ensure that the release of software is governed by formal procedures ensuring sign-off, packaging, regression t ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...business requirements into a high-level design specification for software development, taking into account the organization’s technological directions and inform ...assurance that business requirements are gathered and approved during the development and maintenance of systems with potential impact to financial reporting.<br ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...for the management of the networks, systems, and applications that store, process and transmit Company information assets. Company information assets are def ...provided in the [[Sample_System_Development_Life_Cycle_Standard:|'''System Development Life Cycle Standard''']].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...guration management software is available. When a system needs hardware or software upgrade, a computer technician can access the configuration management prog ...lopment, is called [[Software Configuration Management]] (SCM). Using SCM, software developers can keep track of the source code, documentation, problems, chan ...
    7 KB (942 words) - 15:09, 23 March 2007
  • ==Change management in development projects== ...gement methodology adopted for the project. However close liaison between development project managers and the Change Manager is expected and the project manager ...
    4 KB (523 words) - 10:24, 23 April 2010
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (345 words) - 18:55, 28 February 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (345 words) - 14:02, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (346 words) - 14:03, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (345 words) - 13:57, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (346 words) - 14:00, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (346 words) - 14:03, 1 March 2007
  • :Examines the facilities, configuration issues, hardware and gear, software, research material that enterprises need to construct their own incident re :'''Development of Information Classification Standard:''' [[Media:Development-of-Information-Classification-Standard.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (352 words) - 13:58, 1 March 2007
  • ...or the IT environment. Assets include all elements of [[Computer software|software]] and [[Computer hardware|hardware]] that are found in the business environ ==Software Asset Management== ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...organizational structure that reflects business needs. In addition, put a process in place for periodically reviewing the IT organizational structure to adju ::'''1. Risk: Development and maintenance of system with potential impact to financial reporting bypa ...
    4 KB (583 words) - 12:06, 23 June 2006
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (351 words) - 13:56, 1 March 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (350 words) - 18:57, 28 February 2007
  • ...software development processes for any web-based applications. Confirm the process requires training in secure coding techniques for developers, and is based '''Control Stewards Process Narrative''' ...
    3 KB (350 words) - 13:59, 1 March 2007
  • ...acquisition and development process. Consider functionality, hardware and software configuration, integration and performance testing, migration between envir '''Process Narrative'''<br> ...
    3 KB (432 words) - 13:02, 23 June 2006
  • ...on or modification projects, that all necessary elements such as hardware, software, transaction data, master files, backups and archives, interfaces with othe '''Process Narrative'''<br> ...
    3 KB (436 words) - 12:51, 23 June 2006
  • Software security policy<br> • System development and maintenance ...
    3 KB (360 words) - 16:59, 25 June 2006
  • '''AI 2.10 Application Software Maintenance'''<br> Develop a strategy and plan for the maintenance and release of software applications. Issues to consider include release planning and control, reso ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...he application developer. Quite often these unnecessary changes introduced software bugs necessitating further changes.<br> Later it became a fundamental process in quality control. It is also formally used where the impact of a change c ...
    3 KB (533 words) - 14:15, 23 April 2010
  • ...ssessment when significant technical or logical discrepancies occur during development or maintenance.<br> '''Process Narrative'''<br> ...
    2 KB (329 words) - 13:35, 6 March 2007
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> Through the development and management of key information security processes.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • '''Sustainable Risk Reduction Through Information Security Process Awareness Test Template.'''<br> '''''Through the development and management of key information security processes.'''''<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • ...tems software in accordance with its acquisition, development and planning process.<br> '''Process Narrative'''<br> ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ==Development and Acquisition== ...elopment of software applications or systems and the purchase of hardware, software, or services from third parties.<br> ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • '''Process Narrative'''<br> Insert a description of the process narration that is applicable to the existing control statement this narrati ...
    3 KB (382 words) - 18:02, 3 May 2006
  • ...ed the research, and they became the foundation from which CMU created the Software Engineering Institute (SEI). Like any model, it is an abstraction of an exi When it is applied to an existing organization's software development processes, it allows an effective approach toward improving them. Eventuall ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • Establish procedures in line with the enterprise development and change standards that require a post-implementation review of the opera ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ===Control of operational software=== Procedures should be implemented to control the installation of software on operational systems, to minimize the risk of interruptions in or corrupt ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...on, incident handling, distribution controls (including tools), storage of software, and review of the release and documentation of changes. The plan should al ...gement involves users in the design of applications, selection of packaged software and the testing thereof, to maintain a reliable environment.<br> ...
    4 KB (530 words) - 11:58, 23 June 2006
  • ...ogram changes, system changes and maintenance (including changes to system software) is standardized, logged, approved, documented and subject to formal change ::'''8. Risk: Concurrent access to code in development leads to improper or incomplete changes.'''<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...e that the acquisition of IT-related infrastructure, facilities, hardware, software and services satisfies business requirements.<br> ...'SOX.1.15''']] The organizations SDLC policies and procedures consider the development and acquisition of new systems and major changes to existing systems.<br> ...
    3 KB (442 words) - 13:59, 23 June 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)