From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,500 courses taught by industry experts.

Change and configuration management

Change and configuration management

- [Presenter] Information technology is in a constant state of change. It's hard to find an organization that relies on technology that doesn't go through changes every day, ranging from simple software updates to major system deployments. Information security professionals must understand the role that change management plays in protecting the organization. Now, change is a good thing. Progress comes from change, and organizations change on a daily basis. When it comes to information technology, organizations must take steps to ensure that change achieves business objectives without disrupting operations. That's where change management comes into play. Change management processes ensure that organizations follow a standard process for requesting, reviewing, approving, and implementing changes to information systems. They have the goal of minimizing the probability and impact of disruptions to normal IT service because of change. This includes an assessment of the security impact of a…

Contents