1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Ensure business continuity with change management

Discussion in 'CSO' started by RSS, May 6, 2016.

  1. RSS

    RSS New Member Member

    Changes to systems and networks happen every day. When implemented, changes usually come with some risk of system failure. They can also inadvertently weaken security. A documented, policy-driven change management process helps reduce risks associated with change.

    When we make a change to a system or network, we face the possibility that security may be weakened or that the risk of business process interruption increases. This includes increasing risk to data unexpectedly crossing trust boundaries.

    A trust boundary exists between two network segments or two systems with different trust levels. A trust level is determined by how well the infrastructure and software is hardened and monitored. For example, a system handling payment card information (PCI) might possess a higher trust level than a file server. In that case, if data passes from the PCI system to the file server, they cross a trust boundary.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page