Configuration Management Plan The Purpose Research Paper

Identification of vulnerability will require a corporate organization to make a decision to implement changes for the email server to enhance an effective corporate network system. Process to Implement the Decision

Process to implement the decision is to set aside both financial and human resources. Organizations should set aside that sufficient financial resources, and skilled it personnel to carry out the implementation of the project. Personnel to carry out patch stability must possess expertise in critical system and capable of verifying stability of the system after the patch installation. However, before the installation of patch is carried out, there is a need to implement a full back up of all data as well as server configuration. A best practice for disaster recovery is to do a back up of data. Moreover, there is a need to create an Emergence Repair disk for the email server.

Process to Implement the Change Request

The process to implement the change request is to install patches in the email server. However, an organization should update the gateway before installing patches to address vulnerability in the email server. The process to implement the change process involves the following:

Creating organizational-specific patch database,

Testing patches,

Distributing vulnerability and patch information to system administrators

Verification of patch installation through host and network scanning,

Provide training for system administrators for the use of vulnerability databases,

Deploying patches automatically.

The important step is to train system administrators who will be responsible to the vulnerability database. Training will assist the organization...

...

The next important process is to perform an automatic deployment of patches using an automated distributed patch deployment. Using this strategy, an organization will be able to provide a maximum security for the mail server.
Identification of Method to Monitor the System.

"Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions" (Dempsey, Chawla, Johnson,. et al. 2011 P. 1).

Methods that an organization could use to monitor the system are as follows:

Maintaining situational awareness of the system across the organization;

Use of automation system to monitor the system to identify potential risks,

Installing Malware detection tool to perform periodic scans and detect vulnerability to the system entry and exit points,

Use of Information System Security Officer to constantly monitor the system.

Creating a policy to ensure that employee monitor threats,

Maintaining an understanding with employees about threats and threat activities;

Always assessing all security controls.

Sources Used in Documents:

References

Mell, P & Tracy, M.C. (2002).Procedures for Handling Security Patches. NIST Special Publication 800-40.

Dempsey, K. Chawla, N.S. Johnson, a. et al. (2011). ISCM) (Information Security Continuous Monitoring) for Federal Information Systems and Organizations. National Institute of Standards & Technology.

SANS Institute. (2003).Practical Methodological Process for Implementing a Patch management Process. SANS Institute Reading Room.


Cite this Document:

"Configuration Management Plan The Purpose" (2013, June 14) Retrieved April 29, 2024, from
https://www.paperdue.com/essay/configuration-management-plan-the-purpose-91948

"Configuration Management Plan The Purpose" 14 June 2013. Web.29 April. 2024. <
https://www.paperdue.com/essay/configuration-management-plan-the-purpose-91948>

"Configuration Management Plan The Purpose", 14 June 2013, Accessed.29 April. 2024,
https://www.paperdue.com/essay/configuration-management-plan-the-purpose-91948

Related Documents

Configuration Management Design Methodology for producing Modularity Aspects of modular product design: Attribute integrity Process integrity Process stability Details oriented Scope, procedures, goals, and objectives Simple configuration control Minimum requirement for labor Precise and absolute descriptions of changes in question Cooperative and responsive customers' Effective coordination among project team members 111.2 CONFIGURATION Management TERMS AND DEFINITIONS Software Configuration Management Configuration Item Engineering Change Request 121.3 ROLES & RESPONSIBILITIES Configuration Control Board Parallels between the data and functional design of the plan Advantages of modularity 142. CONSIDERATIONS RELATIONSHIP TO SYSTEMS ENGINEERING 142.2 RELATIONSHIP TO

Sidpers Program Risk Management Plan Project description and Objectives Project Scope Project sizing Stakeholder analysis Project Manager (PM) Risk Manager Risk Analyst The identified Sources of Risk in the SIDPERS Project Risk Register Summary Risk Report Risk Breakdown Structure Double P-I matrix Hillson, D and Simon, P (2007).Practical Project Risk Management: The Atom Methodology. Management Concepts. This document contains details of the Risk Management Plan for the SIDPERS Project and defines the risk management process to be used in the risk management process that

76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The

Sports Management Organizational Plan SPORTS Business PLAN Business ORGANIZATION This paper explains the business and organizational structure of Stark Sports Infrastructure (SSI), which is a vast organization dealing multiple functions. This firm is into production, selling and export of sports goods for various games. Apart from this, it also solicits dealings and sponsorships for sports good, kits and equipment of various local and national sports teams. It is also diversified into the field

The author offers detailed information concerning what might be expected by the company as they endeavor to complete a contract. The author also explains the risks associated with certain contracts. Performance assessment is another important issue that arises in the book. Kerzner asserts that the performance of workers should be assessed for several reasons. One of the primary reasons for assessment is to determine both the mistakes and the successes

Strategic Staffing Plan to Human Resources Today there is a high need for recruitment of staff for nuclear power plants. It is not that new plants are being built, and there are now laws against building new nuclear power plants, but, the nuclear electrical energy is now facing a great challenge for the future. This is further realized from a new survey done by the Nuclear Energy Institute and that reinforces