Chapter 15. Governance Techniques
This chapter covers the need for, and use of, techniques such as change control reviews, operational reviews, and ISO 9000 reviews.
Change Control
Periodically the necessity arises to modify an existing hardware and/or software configuration as a result of:
Hardware changes as a result of performance improvements or reconfigurations caused by changes to other systems
Hardware failures during normal operations
The detection of a software error during normal operations
Changes to legislation affecting the organization’s business systems
A change to the business operation of the organization requiring alterations within the information systems
As a result of these changes in the environment, the extent of change required within the existing system configuration must be determined and the change applied in a controlled manner so as to avoid any undue disruption to normal processing. It is critical that during periods of change, the production versions of software are protected against unauthorized changes, untested changes, or even malicious changes.
Change control’s objective is to ensure risk is controlled, not introduced, during a change. This means ensuring that:
All changes are authorized
All authorized changes are made
Only authorized changes are made
All changes are as specified
All changes are cost effective
This control requires a coordinated effort involving managers, users, information systems personnel, and IS Auditors. An effective methodology for authorizing, ...
Get Auditor’s Guide to Information Systems Auditing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.