Page 1412 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1412

produce more efficient software. As the capabilities of programming

               and management improve, the actual produced size of software should
               be smaller.


               Change and Configuration Management

               Once software has been released into a production environment, users
               will inevitably request the addition of new features, correction of bugs,
               and other modifications to the code. Just as the organization

               developed a regimented process for developing software, they must
               also put a procedure in place to manage changes in an organized
               fashion. Those changes should then be logged to a central repository to
               support future auditing, investigation, and analysis requirements.



                  Change Management as a Security Tool



                  Change management (also known as control management) plays
                  an important role when monitoring systems in the controlled
                  environment of a datacenter. One of the authors recently worked
                  with an organization that used change management as an essential
                  component of its efforts to detect unauthorized changes to
                  computing systems.

                  File integrity monitoring tools, such as Tripwire, allow you to

                  monitor a system for changes. This organization used Tripwire to
                  monitor hundreds of production servers. However, the
                  organization quickly found itself overwhelmed by file modification
                  alerts resulting from normal activity. The author worked with them
                  to tune the Tripwire-monitoring policies and integrate them with
                  the organization’s change management process. Now all Tripwire
                  alerts go to a centralized monitoring center, where administrators

                  correlate them with approved changes. System administrators
                  receive an alert only if the security team identifies a change that
                  does not appear to correlate with an approved change request.

                  This approach greatly reduced the time spent by administrators
                  reviewing file integrity reports and improved the usefulness of the
                  tool to security administrators.
   1407   1408   1409   1410   1411   1412   1413   1414   1415   1416   1417