Subject: Information Technology Configuration Management Manual
|
|
|
- Dominick Cummings
- 10 years ago
- Views:
Transcription
1 Form (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release Date MANUAL TRANSMITTAL SHEET 06/19/2012 Subject: Information Technology Configuration Management Manual 1. Explanation of Material Transmitted: This handbook implements the Configuration Management (CM) Manual MS1268. CM is planning and managing the capacity and resources required to package, build, test, and deploy a release into production and establish the service specified in the customer and stakeholder requirements. CM aims to establish and maintain the integrity of all service assets and configurations, and provide efficient repeatable build and installation mechanisms that can be used to deploy changes to the test and production environments and be rebuilt, if required to restore service. 2. Reports Required: None. 3. Material Superseded:. 4. Filing Instructions: N/A. REMOVE: INSERT: Release (Total: 12 sheets) (Total: 13 sheets) /s/ Lisa L. Jollay Acting Assistant Director, Information Resources Management Bureau of Land Management
2 Information Technology Configuration Management Manual BLM Manual 1268
3 Table of Contents CHAPTER 1. OVERVIEW Purpose Objectives Authority Responsibility References Policy File and Records Maintenance Coordination Requirements Relationships with Other IT Activities GLOSSARY OF TERMS... G-1 APPENDIX ACRONYMS AND ABBREVIATIONS... A-1
4 1-1 Chapter 1. Overview 1.1 Purpose This manual establishes policy, assigns responsibilities, and addresses high-level standards and procedures regarding the Bureau of Land Management (BLM) Information Technology (IT) Configuration Management (CM) Program. CM, as an activity, is the identification, control, recording, reporting, and auditing of IT resources, including their versions, baselines, constituent components, attributes, and relationships. This manual generally covers the four major process groups under the Information Technology Infrastructure Library (ITIL) Service Transition. Those process groups are: Service Asset and Configuration Management, Change Management, Release and Deployment Management, and Knowledge Management. 1.2 Objectives This manual establishes and describes the CM program and its interrelationships to other activities. This manual also describes the role of CM in managing existing and future IT assets, and provides management officials and employees with a disciplined approach to documenting, managing, and tracking IT assets throughout their lifecycle. 1.3 Authority Federal Information Security Management Act of 2002, 44 U.S.C Office of Management and Budget (OMB) Circular No. A-130: Management of Federal Information Resources (Revised, Transmittal Memorandum No. 4). National Institutes of Standards and Technology (NIST) Special Publication , Rev 3 (Aug. 2009). The BLM CM process complies with the Clinger-Cohen Act Section 5125 Agency Chief Information Officers, General Responsibilities, the Office of Management and Budget (OMB) Circular A-130 Appendix IV- Analysis of Key Sections, 2. Background, the Capital Planning and Investment Control (CPIC) per the System Development Life Cycle (SDLC) process. 1.4 Responsibility All personnel responsible for or associated with the use, acquisition, development, and maintenance of BLM s IT resources are also responsible for the CM policy specified in this manual and the associated handbook. The specific responsibilities assigned for CM are as follows: A. The Assistant Director-Information Resources Management (AD-IRM) is responsible for the overall management of BLM IT resources. The AD-IRM also oversees BLM compliance with Federal and Departmental policies, guidelines, and regulations governing the management of IT resources.
5 1-2 B. The National CM Policy Manager is responsible for developing and communicating CM policy and ensuring it complies with Federal law, OMB requirements, and Departmental policy and guidance. C. The National Operations Center (NOC) is responsible for the development, testing, deployment, and availability of national IT resources. D. The National CM Operations Manager at the NOC is responsible for coordinating CM activities for the BLM including: 1. Overseeing operation of the National Change Management (NCM) process; 2. Developing procedures to implement an integrated BLM CM program; 3. Overseeing the baselines for national level applications, software, and hardware assets; and 4. Establishing test and implementation priorities for national applications and Commercial-Off-The-Shelf (COTS) products. E. Bureau Assistant Directors (AD) are responsible for ensuring that CM program objectives are carried out within their areas of responsibility and ensuring that skilled staff are assigned to oversee and manage IT resources under their jurisdiction. F. State and Center Directors are responsible for ensuring that CM program objectives are carried out within their areas of responsibility and ensuring that a qualified CM Manager is assigned for their organization. G. State/Center IT Managers are responsible for ensuring that CM program objectives are carried out within their areas of responsibility. H. State/Center CM Managers are responsible for ensuring compliance with this manual and the CM Handbook and: 1. Overseeing State/Center CM activities; and, 2. Providing guidance to State/Center Management and technical personnel on CM policy and procedures. 1.5 References ITIL, Version 3.0, Office of Government Commerce, United Kingdom.
6 Policy It is the policy of the BLM to manage IT resources as strategic assets enhancing organizational capabilities and delivering world-class service management for mission-focused activities. It is critical for effective management of IT resources that proper controls are in place to manage configurations and modifications to those resources. A. Core Policy Statements (as adopted by ITIL). a. Common Framework. CM activities must use a common framework of standard, re-usable processes and systems to improve integration of the components involved and reduce variations in a process. All processes must be aligned with other BLM processes or related systems to improve efficiency and effectiveness. Where new processes are required, they must be developed for reusability. The CM Handbook details the framework and underlying procedures, processes, standards, and guidelines that must be used bureauwide for CM program activities. b. Asset and Configuration Management. IT resources must be identified and tracked in the designated, centralized Configuration/Change Management System (CMS) and underlying Configuration Management Database (CMDB) to the maximum extent practicable as determined jointly by the National CM Policy Manager and National CM Operations Manager. i. Baseline Configurations. Baseline configurations must be maintained for IT resources. The baseline configuration must be maintained under configuration control within the CMS/CMDB, using automated mechanisms, to the maximum extent practicable. The baseline configurations must be reviewed for validation and verification, and modified as necessary, no less than annually or when significant changes to the IT resources occur, by the responsible systems authority. c. Change Management. All changes to IT resources must be implemented through authorized processes associated with the level of change based on scope and impact, and the types and criticality (priority) of the IT resources. i. A centralized process for subjected changes to production IT resources must be used in order to minimize the probability of conflicting changes and potential disruption to the production environment. ii. Only duly authorized officials must be allowed complying with all relevant policies set forth herein and with all related procedures, standards, and guidelines outlined in the CM Handbook to make
7 1-4 defined changes to IT resources in the production environment. All others must be denied access to effect said changes. iii. iv. Changes to IT resources will be defined and governed by a Request for Change (RFC) brought forward in the CM process to ensure effective control and traceability. Standardized methods and procedures must be used for efficient and prompt handling of defined changes in order to minimize the impact of change-related incidents on business continuity, service quality, and rework. v. All defined changes and updates to IT resources must be recorded in the proper IT resource (asset) record of the designated CMS and underlying CMDB. vi. vii. viii. One centralized national CMS and CMDB must be used for all defined changes bureau-wide, as available and designated. Changes must be properly justified through the development of a clear business case. Late requests for changes that cannot be properly managed must be remanded for future consideration. d. Releases and Deployments. Release packages must be planned and designed to be built, tested, delivered, distributed, and deployed into the live environment in a manner that provides the agreed levels of traceability, in a cost-effective and efficient way. i. All updates to releases must be recorded in the CMS/CMDB. ii. The CM Handbook must detail release and deployment procedures, processes, standards, and guidelines. e. National Change Advisory Board (NCAB). An NCAB must operate to execute CM activities effectively and efficiently. The NCAB must be cochaired by the National CM Policy Manager and the NOC CM Operations Manager. The NCAB must have adequate business and mission representation along with technical, IT security, and operations staff. The meeting will be facilitated and coordinated by alternating CM team members across the BLM.
8 1-5 i. The NCAB will meet on a weekly basis, or as necessary, to discuss and decide on proposed RFCs. ii. iii. iv. The NCAB must also conduct a separate meeting each month to discuss overall CM program and policy initiatives. An Emergency Change Advisory Board (ECAB) must be established to address those urgent RFCs where waiting for the routine NCAB meeting is not acceptable. The ECAB may be a subcomponent of the NCAB and related processes and procedures may be utilized. The CM Handbook must detail the processes to be used by the NCAB and ECAB. f. Annual Review. This manual and underlying handbook must be reviewed annually, and modified as necessary, to ensure continuing validity, effectiveness, and efficiency of the CM program and related operations throughout the BLM. B. Scope. The policy contained in this document applies to all BLM IT resources, at all levels. This policy is mandatory for all organizational units, employees, contractors, and others having access to, or using, the IT resources of the BLM. This manual applies to all existing and future IT investments. It also applies to all internal service level agreements (SLA) between organizational units, interagency agreements, and contracts made between the BLM and other public and private organizations. C. Background. The Washington Office (WO) and NOC are working together to bring IT CM to a higher level of value for the BLM. Configuration Management is the maintenance of information about IT assets and their relationships to other assets and business processes. The CM activity also encompasses Asset Management, and Change Management. Since April 3, 2003, the BLM CM activities have been guided by the Information Technology Configuration Management Manual and Handbook (1268). One major industry advancement and one organizational change prompted modifications to the BLM CM activities and their related manual and handbook. The major industry advancement is due to the availability of a tested framework and approach for IT Service Management, named the ITIL. ITIL seeks to deliver maximum service value through organized processes that support the functions of delivering IT services to customers. It was created by the United Kingdom s Office of Government Commerce. The organizational change is the result of the Management for Excellence (M4E) initiative in which the NOC was directed to assume operational responsibilities for IT
9 1-6 operations and the WO Information Resources Management Directorate was directed to focus on IT policy and governance. This activity is expected to streamline the change request process by automating forms and providing access to a comprehensive national CM database, thereby improving service delivery by maintaining real-time configuration information and minimizing IT outages caused by inoperability amongst IT assets and uncoordinated changes. 1.7 File and Records Maintenance Configuration Management records must be maintained in accordance with BLM records management policy and procedures. 1.8 Coordination Requirements Configuration Management policy and procedures will be coordinated and disseminated through State and Center configuration managers. These configuration managers will ensure that IT managers; IT security, records, data, and system administrators; help desk personnel; project managers; and, user representatives are kept informed of CM-related activities and that appropriate personnel are included in reviews. State and Center configuration managers will produce status reports of CM activities to share with other configuration managers in regularly scheduled meetings. Project managers will coordinate CM documents, software requests, and testing through the appropriate CM manager. 1.9 Relationships with Other IT Activities This section describes the roles of other activities that interface with particular aspects of CM. Those activities are as follows: A. Data Administration objectives establish policy, procedures, and standards that guide the BLM s efforts in effective management of information. The focus is on preserving the integrity and security of data collected, used, and shared within the BLM. Data Administration includes the concepts of data quality, data privacy, data security, and database integrity. B. Freedom of Information Act (FOIA) objectives provide any person the right to access Federal records, except for records (or portions thereof) that are protected from disclosure by one of nine exemptions. This statute also requires specific information, such as agency rules, regulations, and final decisions are made available as public records. The FOIA is a disclosure statute, but recognizes that the Government is responsible for safeguarding the confidentiality of sensitive personal, commercial, and governmental (proprietary/confidential) information.
10 1-7 C. IT Security is responsible for the confidentiality, integrity, and availability of BLM information. The IT Security program includes managing all aspects of information security including administrative, technical, and physical controls. D. Life Cycle Management (LCM) provides a uniform methodology to developing applications and implementing an IT system. LCM is the process of managing a system from concept to retirement. It represents a structured approach to solving information management needs. LCM covers a broad range of activities, from the identification of a problem or need, to the replacement and archiving of the system. E. BLM Telecommunications provides for the management (planning, operation, and maintenance) of the BLM s telecommunication systems, networks, equipment and services, and define responsibilities. The program provides all BLM telecommunications support in accordance with current statutes, standards, rules, and regulations governing the planning, acquisition, operation, maintenance, and disposal of such capabilities. F. Records Administration objectives establish policy, procedures, and standards for records maintained in electronic and physical form. This includes creation, maintenance, use, disclosure, and disposition of information. Proper administration of records/data/information must be exercised to ensure that the legality, integrity, access, sharing and exchange, and security standards are met. This also includes managing the inventory and disposition of electronic and physical records. G. Bureau Enterprise Architecture objectives provide a management framework describing what needs to happen rather than how it should happen. It applies business rules and processes required to operate the organization that are independent of any specific organizational structure, technology, existing systems, hardware, and software needed in basic operation of the BLM.
11 G-1 Glossary of Terms Asset. An IT resource. See Information Technology (IT) Resources. Asset Management. The process responsible for tracking and reporting the value and ownership of assets throughout their lifecycle. Baseline. A Benchmark used as a reference point. A Configuration Management Baseline can be used to enable an IT Resource to be restored to a known Configuration if a Change or Release fails. Benchmark. The recorded state of something at a specific point in time. A Benchmark can be created for a Configuration, a Process, or any other set of data. Change. The addition, modification or removal of and IT Resource, or anything that could have an effect on an IT Resource. Change Management. The process responsible for controlling the lifecycle of all changes. The primary objective of Change Management is to enable beneficial changes to be made, with minimal disruption to, IT Services. Change Management Database. A database used to store Configuration Records throughout their Lifecycle. The Configuration/Change Management System maintains one or more CMDBs, and each CMDB stores attributes of Configuration Items (CI), and relationships with other CIs. Configuration. A generic term, used to describe information about IT assets and their relationships and settings. Configuration Item. Refers to the fundamental structural unit of a configuration management system, the lowest level element to which the organization will manage. The entity must be uniquely identified so that it can be distinguished from all other configuration items. Configuration Management. The maintenance of information about IT assets and their relationships to other assets and business processes. Configuration/Change Management System. A set of tools and databases that are used to manage an IT Service Provider's Configuration data. The CMS also includes information about Incidents, Problems, Known Errors, Changes and Releases and may contain data about employees, Suppliers, locations, Business Units, Customers and Users. The CMS includes tools for collecting, storing, managing, updating, and presenting data about all Configuration Items and their Relationships. The CMS is maintained by Configuration Management and is used by all IT Service Management Processes.
12 G-2 Configuration Record. A record containing the details of a CI (IT Resource). Each Configuration record documents the lifecycle of a single CI. Configuration records are stored in a Configuration/Change Management Database. Deployment. All of the activities necessary to make a software or hardware system available for use. Information Technology (IT) Resources. IT resources are tools that allow access to electronic technological devices, or are electronic technological devices themselves that service information, access information or is the information itself stored electronically. These resources include all government-supplied computers and servers; desktop workstations, laptop computers, handheld computing and tracking devices; cellular and office phones; network devices such as data, voice and wireless networks, routers, switches, hubs; peripheral devices such as printers, scanners and cameras; pagers, radios, voice messaging, computer generated facsimile transmissions, copy machines, electronic communication including and archived messages; electronic and removable media including CD-ROMs, tape, floppy and hard disks; external network access, such as the Internet; software, including packaged and internally developed systems and applications; and all information and data stored on BLM equipment as well as any other equipment or communications that are considered IT resources by BLM. Lifecycle. The various stages in the life of an IT Service, Asset, Configuration Item, Incident, Problem, or Change, etc. The lifecycle defines the categories for status and the status transitions that are permitted. Policy. A principle or rule to guide decisions and achieve rational outcomes. Policies are used to direct decisions, and to ensure consistent and appropriate development and implementation of processes, procedures, and standards. Procedure. A set of actions or operations which have to be executed in the same manner in order to always obtain the same result under the same circumstances. Procedures are defined as part of processes. Process. A structured set of activities designed to accomplish a specific objective. A process takes one or more defined inputs and turns them into defined outputs. A process may include any of the roles, responsibilities, tools and management controls required to reliably deliver the outputs. A process may define policies, standards, guidelines, activities, and work instructions if they are needed. Program. A number of projects and activities planned and managed together to achieve an overall set of related objectives and other outcomes.
13 G-3 Release. A distribution of a collection of hardware, software, documentation, processes or other components required to implement one or more approved changes to IT resources. The contents of each release are managed, tested, and deployed as a single entity. Release and Deployment Management. Plan, schedule and control the movement of releases to test and live environments. The primary goal of Release Management and Deployment Management is to ensure that the integrity of the live environment is protected and that the correct components are released. Release Management. Release Management is the central responsible body for the implementation of Changes to the IT Infrastructure, so that these are carried out in an effective, secure and verifiable manner. Their tasks include planning, monitoring and implementation of respective Rollouts or Rollins in coordination with Change Management. Request for Change. A formal request for a change to be made. A (Request for Change) RFC includes details of the proposed change and may be recorded on paper or electronically. The term RFC is often misused to mean a change record, or the change itself. Release Packages. A collection of hardware, software, documentation, processes or other components required to implement one or more approved changes to IT services. The contents of each release are managed, tested, and deployed as a single entity.
14 A-1 Appendix Acronyms and Abbreviations AD-IRM Assistant Director Information Resources Management BLM Bureau of Land Management CD-ROM Compact Disk Read Only Memory CM Configuration Management CMS Configuration/Change Management System CMDB Configuration Management Database CPIC Capital Planning and Investment Control ECAB Emergency Change Advisory Board FOIA Freedom of Information Act FY Fiscal Year IT Information Technology ITIL Information Technology Infrastructure Library LCM Life Cycle Management M4E Management for Excellence NIST National Institute of Standards and Technology NCAB National Change Advisory Board NCM National Configuration Management NOC National Operations Center OMB Office of Management and Budget RFC Request for Change SDLC System or Software Development Lifecycle WO Washington Office
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET. 1283 Data Administration and Management (Public)
Form 1221-2 (June 1969) Subject UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET 1283 Data Administration and Management (Public) Release 1-1742 Date 7/10/2012
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET
Form 1221-2 (June 1969) UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT Release: 1-1718 Date: MANUAL TRANSMITTAL SHEET Subject 1265 Information Technology Investment Management (ITIM)
Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0
Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations
GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question
GENERAL PLATFORM CRITERIA SACM-V3-G-001 Comment: Does the tool use ITIL V3 process terms and align to ITIL V3 workflows and process integrations? SACM-V3-G-002 (OGC ISS 5.1.10) Access Controls Does the
Service Transition. ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1
Service Transition ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1 Lesson Objectives Service Transition - Introduction - Purpose and Objectives
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
General Platform Criterion Assessment Question
Purpose: [E]nsure that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. (ST 4.3.1)
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET MS 1221 DIRECTIVES MANUAL
Form 1221-2 (June 1969) Subject UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET MS 1221 DIRECTIVES MANUAL Release 1-1759 Date 7/25/2014 1. Explanation of Materials
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
NSSC Enterprise Service Desk Configuration Management Database (CMDB) Configuration Management Service Delivery Guide
National Aeronautics and Space Administration NASA Shared Services Center Stennis Space Center, MS 39529-6000 www.nssc.nasa.gov NASA Shared Services Center Version 1.0 NSSC Enterprise Service Desk Configuration
IT Change Management Policy
Date of effect 24 November 2011 Approval Vice Chancellor Documents replaced by this N/A policy Procedures and/or guidelines supporting this policy A. Introduction Purpose IT Change Management Policy 1.
EPA Classification No.: CIO 2123.0-P-01.1 CIO Approval Date: 06/10/2013 CIO Transmittal No.: 13-003 Review Date: 06/10/2016
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-84, dated June 7, 2005 CONFIGURATION MANAGEMENT PROCEDURE 1 PURPOSE The purpose of this procedure is to describe the process EPA Program
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
Classification Appeal Decision Under section 5112 of title 5, United States Code
U.S. Office of Personnel Management Office of Merit Systems Oversight and Effectiveness Classification Appeals and FLSA Programs Atlanta Oversight Division 75 Spring Street, SW., Suite 1018 Atlanta, GA
NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle
THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The most effective way to protect
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 4.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
State HIPAA Security Policy State of Connecticut
Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.
ITIL: Service Transition
Management of IT Environment (6) Riadenie IT prostredia ITIL: Service Transition Martin Sarnovský Department of Cybernetics and AI, FEI TU Košice 1 Content Service Transition Goal, inputs and outputs,
HP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
CMS Policy for Configuration Management
Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION
N(i) 2 WHITE PAPER on CHANGE MANAGEMENT
on CHANGE MANAGEMENT ABOUT THIS... 2 IT AND CHANGE MANAGEMENT... 3 RESPONDING TO PERFORMANCE AND ACCOUNTABILITY DEMANDS...3 AN EMERGING NEED FOR CHANGE MANAGEMENT...3 DEFINING CHANGE MANAGEMENT... 4 WHAT
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS. Section 40.1. Purpose
CIOP CHAPTER 1351.40 Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS Section 40.1. Purpose... 1 Section 40.2. Background... 2 Section 40.3. Scope and Applicability... 3
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
FLORIDA COURTS E-FILING AUTHORITY HELP DESK POLICIES & PROCEDURES
FLORIDA COURTS E-FILING AUTHORITY HELP DESK POLICIES & PROCEDURES Introduction The Florida Courts E-Filing Authority ( Authority ) was created and established in order to: (1) design, develop, implement,
CHG-11-G-001 Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 N/A. Edition workflows and process integrations?
Purpose: [C]ontrol the lifecycle of all changes, enabling beneficial changes to be made with minimum disruption to IT services. (ST 4.2.1) Activities include: Assessing the impact of business change on
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
How To Manage A Service Transition
SERVICE TRANSITION Service Transition Development and improvement of capabilities for transitioning new and changed services into operations SOURCE: ITIL Service Transition Publication, p. 6 Service Transition
The ITIL Foundation Examination Sample Paper A, version 5.1
The ITIL Foundation Examination Sample Paper A, version 51 Multiple Choice Instructions 1 All 40 questions should be attempted 2 All answers are to be marked on the answer grid provided 3 You have 60 minutes
Audit of Veterans Health Administration Blood Bank Modernization Project
Department of Veterans Affairs Office of Inspector General Audit of Veterans Health Administration Blood Bank Modernization Project Report No. 06-03424-70 February 8, 2008 VA Office of Inspector General
1 Why should monitoring and measuring be used when trying to improve services?
1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT
5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT 5 FAM 621 GENERAL (Office of Origin: IRM/BMP/SPO/PMD) a. The strategic importance of Information Technology (IT) to the mission of the State Department
White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management
White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
U.S. Department of Education Federal Student Aid
U.S. Department of Education Federal Student Aid Enterprise Operational Change Management Plan Version 1.3 October 6, 2010 Document Version Control Document Version Control Version Date Description 1.0
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 4.2 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Department of the Interior Privacy Impact Assessment
Department of the Interior September 8, 2014 Name of Project: Enterprise Data-at Rest (DAR) Encryption Bureau: Office of the Secretary Project s Unique ID: 010-000000666 Once the PIA is completed and the
5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS
5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS (CT:IM-158; 12-29-2014) (Office of Origin: A/GIS/IPS) NOTE: In October, 2014, the Department issued an interim directive superseding
Transmittal Sheet #: 2005-0011 Date: July 12, 2005
ADMINISTRATIVE COMMUNICATIONS SYSTEM UNITED STATES DEPARTMENT OF EDUCATION Office of Management, Executive Office 400 Maryland Avenue; Washington, DC 20202 Transmittal Sheet #: 2005-0011 Date: July 12,
Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19
Service Asset and Configuration 1. Does the tool facilitate the registration and management of an organization s logical, physical and virtual Configuration Items (CIs)? For example, services, systems,
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Process Guide. Release Management. Service Improvement Program (SIP)
Process Guide Release Service Improvement Program (SIP) i Table of Contents Process Guide Release Document Information... 3 Approval... 4 Section 1: Process Vision... 6 Overview... 6 Process Mission and
Page 1 of 8. Any change, which meets the following criteria, will be managed using IM/IT Change Management Process.
Page 1 of 8 1. Introduction This policy describes the Authority s Information Management/Information Technology (IM/IT) change management procedures. IM/IT manages changes to applications, infrastructure
A. Title 44, United States Code, Chapter 35, Coordination of Federal Information Policy
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 138-01 Revision Number: 00 Issue Date: 4/10/2014 ENTERPRISE INFORMATION TECHNOLOGY CONFIGURATION MANAGEMENT This Directive
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR
Bureau of Land Management. Information System Decommissioning Guide
Department Bureau of the Land Interior Management Bureau of Land Management Information System Decommissioning Guide Version Control Log Date Version # Author Description January 11, 2011 0.1 WO-550 Original
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 200.1A Approved: SUBJECT: INFORMATION TECHNOLOGY MANAGEMENT 1. OBJECTIVES. The Department of Energy s (DOE) overarching mission, to advance the national,
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
Information Technology Infrastructure Library (ITIL) Relative to CMII (Rev B)
W H I T E P A P E R Information Technology Infrastructure Library (ITIL) Relative to CMII (Rev B) SUMMARY ITIL provides a framework for organizing service management in an IT environment and is used to
U.S. Department of Education Federal Student Aid
U.S. Department of Education Federal Student Aid Lifecycle Management Methodology Stage Gate Review Process Description Version 1.3 06/30/2015 Final DOCUMENT NUMBER: FSA_TOQA_PROC_STGRW.NA_001 Lifecycle
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
The CMDB at the Center of the Universe
The CMDB at the Center of the Universe Reg Harbeck CA Wednesday, February 27 Session 5331 Purpose Clarify origin of CMDB concept and what it is Understand difference and equivalence between CMDB and Asset
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL
1 Introduction The Information Technology Infrastructure Library (ITIL) aims to improve the management of IT services within the organization, for lowered costs, improved efficiency and productivity. But
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
U.S. Department of Education. Office of the Chief Information Officer
U.S. Department of Education Office of the Chief Information Officer Investment Review Board (IRB) CHARTER January 23, 2013 I. ESTABLISHMENT The Investment Review Board (IRB) is the highest level IT investment
Which statement about Emergency Change Advisory Board (ECAB) is CORRECT?
ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification
Release Management PinkVerify v2.1. Mandatory Criteria
Mandatory Criteria *CMDB= Configuration Management Database *CI= Configuration Item *DSL= Definitive Software Library *RFC= Request for Change *SLA= Service Level Agreement 1. Does the tool facilitate
HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide
HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0
ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key
Applying ITIL v3 Best Practices
white paper Applying ITIL v3 Best Practices to improve IT processes Rocket bluezone.rocketsoftware.com Applying ITIL v. 3 Best Practices to Improve IT Processes A White Paper by Rocket Software Version
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
An ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
Ames Consolidated Information Technology Services (A-CITS) Statement of Work
Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
How To Write A Contract For Software Quality Assurance
U.S. Department of Energy Washington, D.C. NOTICE DOE N 203.1 Approved: Expires: 06-02-01 SUBJECT: SOFTWARE QUALITY ASSURANCE 1. OBJECTIVES. To define requirements and responsibilities for software quality
The ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper B, version 4.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
An introduction to ITIL concepts
An introduction to ITIL concepts Written by Justin Murray October 2005 Introduction... 2 Objective... 2 The ITIL books and processes... 3 Service Management: a key part of ITIL... 4 Service Support...
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Rotherham CCG Network Security Policy V2.0
Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
