Hardware And Software Configuration And Maintenance

1232 Words3 Pages

Hardware and Software Configuration and Maintenance

Issue Statement

Nicholls and Stewart Ltd Handbook, requires appropriate administrative, physical and technical controls be incorporated into all new applications and modified applications. Security Application Systems must have security in place that encompasses not only the software, but the routine activities that enables the computer system to function correctly. These include fixing software or hardware problems, loading and maintaining software, updates to hardware and software and maintaining a historical record of application changes.

Applications
These policies apply to both the firm data type ‘top secret’ and ‘others’ in accordance to Security Application Systems.
Hardware and Software Security Policy

• The following configuration management practices shall be documented and maintained by the IT maintenance staffs for all applications:

 Version control that associates system components to the appropriate system version.

 Every new hardware that the company takes in shall undergo new setup and will be preceded with a baseline report.

 Procedures for testing and/or endorsing framework parts (working framework, other framework, utility, applications) before advancement to generation.

 Analyses to determine the effect of proposed changes on existing security controls to include the required training for both technical and user communities associated with the change in hardware/software.

 Change ID, approval, and documentation procedures.

 Procedures for ensuring contingency plans and other associated documentation are updated to reflect system changes.

 Procedures for using test data “live” data or made-up data.

 Procedures on how critical fixes are...

... middle of paper ...

...ended to correspondences, for example, emails and letters.

 Addressing any information insurance inquiries from columnists or media outlets like daily papers.

 Any data being exchanged on a compact gadget (e.g., USB stick, portable computer) must be encoded in accordance with industry best practices and material law and regulations. On the off chance that there is uncertainty with respect to the necessities, look for direction from [complete as appropriate].

 You should promptly advise [complete as appropriate] on the off chance that a gadget containing in-degree information is lost (e.g., cell telephones, laptops, and so on).

 Where essential, working with other staff to guarantee promoting activities submit to information security standards.

 Terminated workers will be obliged to give back all records, in any configuration, containing individual data.

More about Hardware And Software Configuration And Maintenance

Open Document