Chapter 3 Flashcards
(19 cards)
Approval process
Having the project and budget authorized
Ownership
Someone who is responsible for a security task
Stakeholders
People who own shares or invest money into the company
Impact analysis
Consider the implications of any change
Test results
Testing new security measures
Blackout plan
Having a rollback option
Maintenance window
Where scheduled changes are implemented
Standard operating procedure
Rulebook on how to carry out tasks
Allow lists/deny lists
Allow or deny a user/device
Restricted activities
Activities that can cause harm
Downtime
Impacts a pause in activities
Service restart
Can cause disruption to a system
Application restart
Weakness that can emerge on restart
Legacy applications
Vulnerabilities on older applications no longer supported
Dependencies
Services, system drivers and interconnections that are intertwined
Documentation
Identify changes made and by whom
Updating diagrams
Outlines your current environment
Updating policies/procedures
Reflect changes that are pivotal to maintain a secure environment
Version control
Tracks changes to documents and projects