From the course: Cloud Security Operations by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Configuration and change management
From the course: Cloud Security Operations by Pearson
Configuration and change management
This lesson is all about the IT practices of change and configuration management. Now, we're going to begin with configuration management because you have to have a baseline configuration first before you can change anything. You have to have something to change. So let's start with configuration management. And the objective is to certify that precise and meaningful data and information is readily available regarding the configuration of applications and services and the configuration items, or CIs, that support them. This IT service management practice includes all the relationships and dependencies between the configuration items. Those objects include hardware, software, networks, sites and facilities, vendors, suppliers, and even people. Configuration management is a governance and systems lifecycle process for ensuring the consistency by classifying and tracking individual CIs, documenting functional capabilities and all interdependencies, and verifying the effects or…
Contents
-
-
-
-
(Locked)
Configuration and change management7m 26s
-
(Locked)
Continuity management2m 27s
-
(Locked)
Information security management1m 21s
-
(Locked)
Service-level management3m 58s
-
(Locked)
Incident and problem management7m 51s
-
(Locked)
Release and deployment management2m 47s
-
(Locked)
Availability management2m 26s
-
(Locked)
Capacity management1m 25s
-
(Locked)
Security operations centers (SOC)9m 5s
-
(Locked)
Intelligent security control monitoring15m 26s
-
(Locked)
Vulnerability assessment3m 20s
-
(Locked)
-
-
-