O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Revision Control and Configuration Management

As a followup to testing and acceptance policies in the previous sections, one way to ensure the ability to uninstall versions of software is through revision control or configuration management. The security impact of change management is knowing the configuration of the system and its components. By knowing what is supposed to be in the system and the network, the administrators can tell if security has been violated and rogue programs have been installed on the system.

Some aspects of configuration management duplicate the policies that were discussed for software development. However, not everything under this system will be from software development. They are included here to amplify their ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required