Configuration Management SOP
|
|
|
- Nicholas McCarthy
- 9 years ago
- Views:
Transcription
1 1.0 Commercial in Confidence 08-Aug of 7 Configuration Management SOP Document No: SOP_0113 Prepared by: David Brown Date: 09-Aug-2006 Version: 1.0
2 1.0 Commercial in Confidence 08-Aug of 7 Document Approval Name Role Date Signature David Brown Author Document Control Version Author Date Description 1.0 David Brown 08-Aug-2006 Version 1
3 1.0 Commercial in Confidence 08-Aug of 7 Table of Contents 1 Introduction Purpose Scope Definition Responsibility References Configuration Management Plan Contents - Procedure Configuration Management Plan Title Approval Environment identification Application Configuration Items Baselines Version Identifier and Version Control... 7
4 1.0 Commercial in Confidence 08-Aug of 7 1 Introduction 1.1 Purpose 1.2 Scope To provide a methodology for the management of software and related configuration items for a validated computer system. Department/Section: IT Groups. Configuration Management provides a basis for ensuring an orderly control of configuration elements produced by IT and an effective mechanism for incorporating software changes, both during development and operations. 1.3 Definition Baseline - A point in time when all modifications to source and object are frozen and are under change control. Element - Application programs, object files, source code files, documentation, data base structures, key parameter file information. Environment - A collection of hardware, software, network communications and procedures that work together to provide a discrete type of computer service. There maybe one or more environments on a physical platform (e.g. test, pilot, production). An environment has unique features and characteristics that dictate how they are administered in similar, yet diverse manners. Examples of platforms are Windows 2003 Server, Linux, and Solaris. Version Identifier - A version date or version number. Software Categories the following list provides a categorization of software referenced in this SOP: Category 1 - Operating Systems Category 2 - Standard Instruments, Micro Controllers, Smart Instrumentation Category 3 - Standard Software Packages Category 4 - Configurable Software Packages Category 5 - Application Specific or Custom Built Software
5 Title Configuration Management SOP 1.0 Commercial in Confidence 08-Aug of 7 Client the business system owner is typically the line manager responsible for the business process where the computer system will be used. Validation Group the group responsible for ensuring that computer systems are implemented and maintained in a validated state. IT Group the group responsible for development, operation, and maintenance of computer systems. 1.4 Responsibility Validation and the other disciplines listed within this SOP are responsible for ensuring this procedure is followed. It is the responsibility of the IT groups to ensure that source code, object code and other software components are maintained under proper configuration control. 1.5 References Document ID SOP_0102 Title Document Standards SOP 2 Configuration Management Plan Contents - Procedure The Configuration Management Plan must be prepared according to the general format requirements defined in SOP SOP_0102 Documentation Standards. A Configuration Management Plan is developed for each unique computer system that would define for each application the specific process for controlling the application elements. A software system that functionally provides configuration management should be employed. Where a suitable software product is not available, access security must be restricted to prevent write/update privilege on the test and production baseline libraries to members of the IT Group who are responsible for maintaining configuration control.
6 1.0 Commercial in Confidence 08-Aug of Configuration Management Plan Title 2.2 Approval Give the configuration management plan a descriptive title that uniquely identifies the system. At the beginning of the configuration management plan an approval section is required. This section will contain a table for signatures. The table of signatures must provide for the following information to be captured: 1. The department or function of the signatory; 2. The name of the signatory; 3. A space to record the signature, and; 4. A space to record the date of the signature. The section must contain a statement informing the reviewer that signing this document infers that they have read, understood and agree with the contents of the plan. Normally this information is collected on the approval page of the plan. 2.3 Environment identification Describe the hardware including the model number, operating system version, and vendor. Also include change control product names and release numbers. 2.4 Application Configuration Items 2.5 Baselines Identify the specific type or group of configuration elements that comprise the application and are defined as requiring configuration control. Provide a description of the baselines (i.e. unit, system, production) from an environment perspective (hardware & software). Provide a description of the tools necessary for managing/controlling the baseline. Provide a description of the location of system configuration element (or libraries) for each baseline.
7 1.0 Commercial in Confidence 08-Aug of Version Identifier and Version Control Control must be maintained over the various versions of configuration elements to ensure consistency and also to ensure that modifications are implemented appropriately. Each configuration element must be uniquely identified with a version number or version date before it is initially placed under change control in the test environment. Modifications to configuration elements can be approved and implemented between each baseline. A version will be incremented for configuration elements each time a modification is approved and placed under change control. The version number or version date will remain the same as the element moves from one baseline to another as long as the element has not been modified. Describe the method and format of the version numbering of elements. Describe how each element can be examined for its unique version number.
Document Control SOP. Document No: SOP_0103 Prepared by: David Brown. Version: 10
1.0 Commercial in Confidence 16-Aug-2006 1 of 6 Document Control SOP Document No: SOP_0103 Prepared by: David Brown Date: 16-Aug-2006 Version: 10 1.0 Commercial in Confidence 16-Aug-2006 2 of 6 Document
601/8498/X IAO Level 3 Certificate in Web Design and Development (RQF)
601/8498/X IAO Level 3 Certificate in Web Design and Development (RQF) A summary of the qualification s content This is a regulated qualification designed to equip you with the knowledge and skills that
California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17.
Table of Contents 1.0 GENERAL... 3 1.1 SUMMARY... 3 1.2 REFERENCES... 3 1.3 SUBMITTALS... 3 1.3.1 General... 3 1.3.2 Service Request Criteria... 4 1.4 EXPECTATIONS... 4 1.4.1 OTech... 4 1.4.2 Customer...
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Patch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
Bay Area Shared Regional ICT Lab Memorandum of Understanding
Bay Area Shared Regional ICT Lab Memorandum of Understanding This Memorandum of Understanding (MOU), outlines partnership agreements related to the implementation of a Shared Regional ICT Lab project,
<Insert Picture Here> Oracle Premier Support Get Ahead. Stay Ahead.
Oracle Premier Support Get Ahead. Stay Ahead. Emilio Salvadori Services Renewal Sales Senior Manager Oracle Support Get Ahead. Stay Ahead. Industry leadership in customer services
PROJECT SCOPE STATEMENT
PROJECT SCOPE STATEMENT Note: Any work not explicitly included in this Project Scope Statement is implicitly excluded from the project. Create links to referenced documents (e.g., Link_To_ ) by using Insert
5 FAH-5 H-510 CONFIGURATION MANAGEMENT
5 FAH-5 H-500 CONFIGURATION MANAGEMENT 5 FAH-5 H-510 PROJECT DEVELOPMENT AND CHANGE CONTROL (CT:ITS-4; 06-21-2012) (Office of Origin: IRM/BMP/GRP/GP) (Updated only to revise Office of Origin) 5 FAH-5 H-511
IT Financial Management and Cost Recovery
WHITE PAPER November 2010 IT Financial Management and Cost Recovery Patricia Genetin Sr. Principal Consultant/CA Technical Sales David Messineo Sr. Services Architect/CA Services Table of Contents Executive
Eastern Illinois University information technology services. strategic plan. January,
Eastern Illinois University information technology services strategic plan January, 2014 Introduction With the selection of emerging technologies as one of the six themes of the university s recent strategic
CONFIGURATION MANAGEMENT PLAN GUIDELINES
I-680 SMART CARPOOL LANE PROJECT SYSTEM ENGINEERING MANAGEMENT PLAN CONFIGURATION MANAGEMENT PLAN GUIDELINE SECTIONS: PLAN GUIDELINES 1. GENERAL 2. ROLES AND RESPONSIBILITIES 3. CONFIGURATION MANAGEMENT
ontune SPA - Server Performance Monitor and Analysis Tool
ontune SPA - Server Performance Monitor and Analysis Tool Product Components - ontune is composed of the Manager; the Agents ; and Viewers Manager - the core ontune component, and installed on the management/viewing
POSITION QUALIFICATIONS. Minimum Experience (Yrs)
POSITION QUALIFICATIONS Core Labor Category Skill Minimum Education Minimum Experience (Yrs) Labor Category Description Technical Manager, Principal Bachelors Degree 12 Technical Manager, Senior Bachelors
Organization. Project Name. Project Overview Plan Version # Date
Project Overview Plan Template Organization Project Name Project Overview Plan Version # Date REVISION HISTORY VERSION # REVISION DATE COMMENT 1 APPROVALS: Authorized Signature DATE 2 Table of Contents
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise
Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise 1. Introduction Information security means protecting information
INFORMATION SYSTEMS ANALYST III
INFORMATION SYSTEMS ANALYST I INFORMATION SYSTEMS ANALYST II INFORMATION SYSTEMS ANALYST III Class specifications are intended to present a descriptive list of the range of duties performed by employees
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
Server Virtualization with Windows Server Hyper-V and System Center
Course 20409B: Server Virtualization with Windows Server Hyper-V and System Center Course Details Course Outline Module 1: Evaluating the Environment for Virtualization This module provides an overview
How To Manage A Project
IT Infrastructure Library (ITIL) and Project Management PMI Washington DC Chapter Tools Meeting Garret Goldstein PMP, ITIL Foundation Delivery Manager CA Technology Services 703-708-3253 [email protected]
Information Technology Infrastructure Library (ITIL) Relative to CMII (Rev B)
W H I T E P A P E R Information Technology Infrastructure Library (ITIL) Relative to CMII (Rev B) SUMMARY ITIL provides a framework for organizing service management in an IT environment and is used to
Change Management Policy
Change Management Policy Change management refers to a formal process for making changes to IT services. The goal of change management is to increase awareness and understanding of proposed changes across
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Commercial Software Licensing
Commercial Software Licensing CHAPTER 10: (ITAM) Software Asset Management (SAM) Prepared by DoD ESI January 2013 Chapter Overview (ITAM) and Software Asset Management (SAM) allow for a complete and accurate
Chapter 12. Development Tools for Microcontroller Applications
Chapter 12 Development Tools for Microcontroller Applications Lesson 01 Software Development Process and Development Tools Step 1: Development Phases Analysis Design Implementation Phase 1 Phase 2 Phase
Report of Independent Accountants. To the Management of Verizon Communications Inc. Verizon Business IP Application Hosting:
Report of Independent Accountants Ernst & Young, LLP Two Commerce Square Suite 4000 2001 Market Street Philadelphia, Pennsylvania 19103-7096 Tel: +1 215 448 5000 Fax: +1 215 448 4069 www.ey.com To the
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE KEY FEATURES Rich and comprehensive business metadata allows business users to interact with financial services data model to configure
Software and Hardware Configuration Management
DOWNLOADED AND/OR HARD COPY UNCONTROLLED Verify that this is the correct version before use. AUTHORITY DATE Jeffrey Northey (original signature on file) IMS Manager 07/09/2014 Doug Dorrer (original signature
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R
Document Title. Xerox Secure Access Unified ID System 5.3 Release Notes RNE-14012 v2.0 (Released) Document ID
Document Title Document ID Xerox Secure Access Unified ID System 5.3 Release Notes Released August 8, 2014 Version 2.0 Author Sonia Betts, Senior QA Specialist Approved By David Juche, Director Software
ELECTRONIC RECORDS MANAGEMENT SYSTEM COMPLIANCE TEST AND EVALUATION PROCESS AND PROCEDURES
ELECTRONIC RECORDS MANAGEMENT SYSTEM COMPLIANCE TEST AND EVALUATION PROCESS AND PROCEDURES NATIONAL ARCHIVES OF MALAYSIA 2009 VERSION 1 1 TABLE OF CONTENTS 1. INTRODUCTION 1.1.PURPOSE... 3 1.2.APPLICABILITY...
JOB DESCRIPTION Network Systems Technician I/II
CITY OF DEL MAR JOB DESCRIPTION Network Systems Technician I/II GENERAL PURPOSE Under supervision, provides liaison and technical assistance to system users for computer and network related problems; consults
CMS Policy for Configuration Management
Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION
CYBER SECURITY POLICY For Managers of Drinking Water Systems
CYBER SECURITY POLICY For Managers of Drinking Water Systems Excerpt from Cyber Security Assessment and Recommended Approach, Final Report STATE OF DELAWARE DRINKING WATER SYSTEMS February 206 Kash Srinivasan
Compliance and Security Challenges with Remote Administration
Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges
Introduction to Computing Facilities
Introduction to Computing Facilities August, 2013 Tod Pike Getting Help SCS Computing Facilities CMU Computing Facilities Building/Office Management Contacting Us (SCS Affiliates Only) Help Desk (9am-5pm,
Deploying and Managing a Public Key Infrastructure
Deploying and Managing a Public Key Infrastructure 2821: Deploying and Managing a Public Key Infrastructure (4 Days) About this Course This four-day, instructor-led course provides students with the knowledge
Services Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
CLASS SPECIFICATION Systems Support Analyst I
San Diego Unified Port District Class Code: B837-UE03 CLASS SPECIFICATION Systems Support Analyst I FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented
City of Winooski. Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING
City of Winooski Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING Issued: February 29, 2016 Deadline for Submissions: 4:00 p.m., March 25, 2016 INTRODUCTION
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
10751-Configuring and Deploying a Private Cloud with System Center 2012
Course Outline 10751-Configuring and Deploying a Private Cloud with System Center 2012 Duration: 5 days (30 hours) Target Audience: This course is intended for data center administrators who will be responsible
An Oracle White Paper March 2013. Oracle s Single Server Solution for VDI
An Oracle White Paper March 2013 Oracle s Single Server Solution for VDI Introduction The concept of running corporate desktops in virtual machines hosted on servers is a compelling proposition. In contrast
Transmittal Sheet #: 2005-0011 Date: July 12, 2005
ADMINISTRATIVE COMMUNICATIONS SYSTEM UNITED STATES DEPARTMENT OF EDUCATION Office of Management, Executive Office 400 Maryland Avenue; Washington, DC 20202 Transmittal Sheet #: 2005-0011 Date: July 12,
Content Management System User Guide
Content Management System User Guide Table Of Contents Getting Started Checklist... 1 Overview: Portal Content Management System... 3 Anatomy of a Portal Page... 3 Overview of the Content Management System...
The Costs of Managed PKI:
The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Mott Community College Job Description
Title: Department: Information Technology Services Reports To: Chief Technology Officer Date Prepared/Revised: May 2009/Revised July 2011 Purpose, Scope & Dimension of Job: The role of the Director of
Server Virtualization with Windows Server Hyper-V and System Center
Course 20409 Server Virtualization with Windows Server Hyper-V and System Center Length: Language(s): Audience(s): 5 Days English IT Professionals Level: 300 Technology: Windows Server 2012 Type: Delivery
Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.
Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff
Configuration Management One Bite At A Time
Configuration Management One Bite At A Time By Kai Holthaus, ITIL v3 Expert and Director for Third Sky, Inc. Implementing Configuration Management can be a daunting challenge. While the potential payback
Sentinel Protection Installer Version 7.0.0 (Windows) ReadMe
Sentinel Protection Installer Version 7.0.0 (Windows) ReadMe This readme provides an overview of the Sentinel TM Protection Installer, its installation and a few tips on using the related components (such
Performance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit.
Is your database application experiencing poor response time, scalability problems, and too many deadlocks or poor application performance? One or a combination of zparms, database design and application
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop Shannon Lawson Command IAM SSC Pacific Distribution Statement A. Approved for Public Release;
State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope
State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Document ID: Title: Supersedes: Status: 1010 Enterprise Messaging and Directory Services Strategy Vision
CA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY
FILE: IIBG-PC COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY PITTSYLVANIA COUNTY SCHOOLS recognizes the importance of computer technology in providing a relevant and appropriate education. Our goal
Accounting for Costs of Computer Software Developed or Obtained for Internal Use
Accounting for Costs of Computer Software Developed or Obtained for Internal Use POLICY STATEMENT The AICPA s Statement of Position (SOP) 98-1 requires that certain costs associated with computer software
E-Lock ProSigner vs. In-built Acrobat 6.0 signatures
E-Lock ProSigner vs. In-built Acrobat 6.0 signatures Table of Contents 1 INTRODUCTION... 2 1.1 E-LOCK PROSIGNER WORKS WITH ANY SECURITY FRAMEWORK... 2 1.2 EASY WIZARD BASED SIGNING OPERATION... 2 1.3 BACKWARD
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
System Build 2 Test Plan
System Build 2 Test Plan Version 1.0 System Build 2 Test Plan Author s Signature Your signature indicates that this document has been prepared with input from content experts and is in compliance with
How To Migrate To Redhat Enterprise Linux 4
Migrating to Red Hat Enterprise Linux 4: Upgrading to the latest Red Hat release By Donald Fischer Abstract Red Hat Enterprise Linux subscribers may choose to deploy any of the supported versions of the
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-2105 Remote Access Security Standard Revision Number: 1.0 Effective
Project Planning Worksheet
Project Planning Worksheet Project Name: Prepared by: Department: Date: Background and Overview Give the business reason for requesting this project, and an overview of the work to be completed. Risks
Service Level Agreement
Between State Agency Here after called "1st Party" And Vendor Here after called "2nd Party" Document Classification: Public Page 1 of 7 Table of Contents Table of Contents... 2 1. SCOPE OF SERVICE... 3
Firewall Access Request Form
SECTION 1 TO BE COMPLETED BY THE APPLICANT By completing the below information the requestor/applicant acknowledges and agrees that he/she has read, understood and will comply with the following: CHECK
SOFTWARE MANAGEMENT PROGRAM. Software Testing Checklist
SOFTWARE MANAGEMENT PROGRAM Software Testing Checklist The following checklist is intended to provide system owners, project managers, configuration managers, and other information system development and
Select the right configuration management database to establish a platform for effective service management.
Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06
virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification
Administering System Center 2012 Configuration Manager
Administering System Center 2012 Configuration Manager MOC 10747 Duración: 25 horas Introducción This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and
IT Customer Relationship Management supported by ITIL
Page 170 of 344 IT Customer Relationship supported by ITIL Melita Kozina, Tina Crnjak Faculty of Organization and Informatics University of Zagreb Pavlinska 2, 42000 {melita.kozina, tina.crnjak}@foi.hr
ALS Configuration Management Plan. Nuclear Safety Related
Westinghouse Non-Proprietary Class 3 Advanced Logic System 6002-00002-NP, Rev. 10 Function Author Nuclear Safety Related July 2014 APPROVALS Name and Signature Anthony C. Pagano* Integrated Process Lead,
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
What is the Purpose of OA s Enterprise IT Helpdesk Procedure?... 2 How will Problems, Questions or Changes be entered?... 2
PROCEDURES FOR REPORTING REMEDY APPLICATION PROBLEMS AND ISSUES PROCEDURES FOR REPORTING REMEDY APPLICATION PROBLEMS AND ISSUES... 2 What is the Purpose of OA s Enterprise IT Helpdesk Procedure?... 2 How
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Parallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
2012 CIP Spring Compliance Workshop May 7-11. Testing, Ports & Services and Patch Management
2012 CIP Spring Compliance Workshop May 7-11 Testing, Ports & Services and Patch Management Purpose This presentation provides an overview of the CIP-007-3 R1 Test Procedures which includes a discussion
