IT Governance, Risk, and Compliance:

April, 2012

1

April 27, 2012  10:19 PM

Managing the IT Configuration – Part VII



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Problem Management, Release Management, Service Delivery, Systems

An IT service problem can be viewed as a demarcated and identified condition extracted from a single incident or multiple incidents exhibiting common symptoms. Initially, the IT service problem is an unknown...

April 25, 2012  2:51 PM

Managing the IT Configuration – Part VI



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Incident Management, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Release Management, Service Delivery, Systems

Cascading from the primary release management objective, the primary release management goal should be to ensure approved and accredited components are installed malfunction-resistant and on schedule. Consequently, the high level activities associated with this process should encompass: release...


April 20, 2012  8:41 PM

Managing the IT Configuration – Part V



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Release Management, Service Delivery, Systems

Once change tests prove satisfactory functionality, most IT CIs should be moved to a secure staging area. Subsequently, a release request should be submitted to the appropriate individual for production implementation. Upon notification of a successfully released change, documentation updates...


April 18, 2012  9:21 PM

Managing the IT Configuration – Part IV



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Service Delivery, Systems

Even a small change in a CI could cause a mission-critical application to fail or disrupt a service. To reduce the likelihood of undesirable consequences, thorough change planning is required for adequate change construction including: back-out planning, change testing and...


April 13, 2012  8:19 PM

Managing the IT Configuration – Part III



Posted by: Robert Davis
Change Control, Change Management, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Service Delivery, Systems

Change management is the practice of ensuring all CI alterations are carried out in a planned and authorized manner. Change can occur for various reasons including response to business process needs, the availability and...


April 10, 2012  9:23 PM

Managing the IT Configuration – Part II



Posted by: Robert Davis
Change Control, CMDB, Configuration Management, IAP, Information Assets Protection, Infrastructure, IT Infrastructure, ITIM, Service Delivery, Systems

Enabling accommodation of essential configuration management requirements is the implementation and control of a database (commonly referred to as a Configuration Management Database (CMDB)) containing details regarding infrastructure elements that are utilized in IT services...


April 6, 2012  10:05 PM

Managing the IT Configuration – Part I



Posted by: Robert Davis
Change Control, Configuration Management, Infrastructure, ITIM, Systems

Configuration management is considered by many knowledge leaders as a key process for enabling IT services support. Under typical circumstances, configuration management’s key process status is attributable to an accepted belief that the initiation point for adequately managing...


April 3, 2012  10:01 PM

Irregularities and Illegal Acts Agreed-Upon Procedures Assessments – Part VIII



Posted by: Robert Davis
Certified Information Systems Auditor, Certified Information Technology Professional, Certified Internal Auditor, Certified Internal Controls Auditor, Certified Public Accountant, Computer Forensics, External Audit, Fraud, GCC, ICS, Internal Audit, IT Audit, ITAC, ITGC, SOD, SOF

Jointly, physical and logical security can significantly reduce the risk of irregular and illegal acts. Within this context, superior IT physical security is a major larceny deterrent for certain hardware. For example, bolting a personal computer to a fortified mount minimizes the threat of thief....


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: