Configuration Management SOP



Similar documents
Document Control SOP. Document No: SOP_0103 Prepared by: David Brown. Version: 10

601/8498/X IAO Level 3 Certificate in Web Design and Development (RQF)

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

Patch Management Marvin Christensen /CIAC

Bay Area Shared Regional ICT Lab Memorandum of Understanding

<Insert Picture Here> Oracle Premier Support Get Ahead. Stay Ahead.

PROJECT SCOPE STATEMENT

5 FAH-5 H-510 CONFIGURATION MANAGEMENT

IT Financial Management and Cost Recovery

Eastern Illinois University information technology services. strategic plan. January,

CONFIGURATION MANAGEMENT PLAN GUIDELINES

ontune SPA - Server Performance Monitor and Analysis Tool

POSITION QUALIFICATIONS. Minimum Experience (Yrs)

Organization. Project Name. Project Overview Plan Version # Date

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

INFORMATION SYSTEMS ANALYST III

Chap 1. Introduction to Software Architecture

Server Virtualization with Windows Server Hyper-V and System Center

How To Manage A Project

Information Technology Infrastructure Library (ITIL) Relative to CMII (Rev B)

Change Management Policy

Virtualization for Cloud Computing

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Commercial Software Licensing

Chapter 12. Development Tools for Microcontroller Applications

Report of Independent Accountants. To the Management of Verizon Communications Inc. Verizon Business IP Application Hosting:

ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE

Software and Hardware Configuration Management

Public Key Infrastructure for a Higher Education Environment

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

Document Title. Xerox Secure Access Unified ID System 5.3 Release Notes RNE v2.0 (Released) Document ID

ELECTRONIC RECORDS MANAGEMENT SYSTEM COMPLIANCE TEST AND EVALUATION PROCESS AND PROCEDURES

JOB DESCRIPTION Network Systems Technician I/II

CMS Policy for Configuration Management

CYBER SECURITY POLICY For Managers of Drinking Water Systems

Compliance and Security Challenges with Remote Administration

Introduction to Computing Facilities

Deploying and Managing a Public Key Infrastructure

Services Providers. Ivan Soto

Retention & Destruction

CLASS SPECIFICATION Systems Support Analyst I

City of Winooski. Request for Proposals Department of Public Works ASSET MANAGEMENT SOFTWARE, IMPLEMENTATION AND TRAINING

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

10751-Configuring and Deploying a Private Cloud with System Center 2012

An Oracle White Paper March Oracle s Single Server Solution for VDI

Transmittal Sheet #: Date: July 12, 2005

Content Management System User Guide

The Costs of Managed PKI:

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Mott Community College Job Description

Server Virtualization with Windows Server Hyper-V and System Center

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Configuration Management One Bite At A Time

Sentinel Protection Installer Version (Windows) ReadMe

Performance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit.

Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope

CA Virtual Assurance for Infrastructure Managers

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

Accounting for Costs of Computer Software Developed or Obtained for Internal Use

E-Lock ProSigner vs. In-built Acrobat 6.0 signatures

Critical Controls for Cyber Security.

System Build 2 Test Plan

How To Migrate To Redhat Enterprise Linux 4

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Project Planning Worksheet

Service Level Agreement

Firewall Access Request Form

SOFTWARE MANAGEMENT PROGRAM. Software Testing Checklist

Select the right configuration management database to establish a platform for effective service management.

DIVISION OF INFORMATION SECURITY (DIS)

virtualization.info Review Center SWsoft Virtuozzo (for Windows) //

Administering System Center 2012 Configuration Manager

IT Customer Relationship Management supported by ITIL

ALS Configuration Management Plan. Nuclear Safety Related

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

What is the Purpose of OA s Enterprise IT Helpdesk Procedure?... 2 How will Problems, Questions or Changes be entered?... 2

Steelcape Product Overview and Functional Description

Parallels Mac Management v4.0

2012 CIP Spring Compliance Workshop May Testing, Ports & Services and Patch Management

Transcription:

1.0 Commercial in Confidence 08-Aug-2006 1 of 7 Configuration Management SOP Document No: SOP_0113 Prepared by: David Brown Date: 09-Aug-2006 Version: 1.0

1.0 Commercial in Confidence 08-Aug-2006 2 of 7 Document Approval Name Role Date Signature David Brown Author Document Control Version Author Date Description 1.0 David Brown 08-Aug-2006 Version 1

1.0 Commercial in Confidence 08-Aug-2006 3 of 7 Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Scope... 4 1.3 Definition... 4 1.4 Responsibility... 5 1.5 References...5 2 Configuration Management Plan Contents - Procedure... 5 2.1 Configuration Management Plan Title... 6 2.2 Approval... 6 2.3 Environment identification... 6 2.4 Application Configuration Items... 6 2.5 Baselines... 6 2.6 Version Identifier and Version Control... 7

1.0 Commercial in Confidence 08-Aug-2006 4 of 7 1 Introduction 1.1 Purpose 1.2 Scope To provide a methodology for the management of software and related configuration items for a validated computer system. Department/Section: IT Groups. Configuration Management provides a basis for ensuring an orderly control of configuration elements produced by IT and an effective mechanism for incorporating software changes, both during development and operations. 1.3 Definition Baseline - A point in time when all modifications to source and object are frozen and are under change control. Element - Application programs, object files, source code files, documentation, data base structures, key parameter file information. Environment - A collection of hardware, software, network communications and procedures that work together to provide a discrete type of computer service. There maybe one or more environments on a physical platform (e.g. test, pilot, production). An environment has unique features and characteristics that dictate how they are administered in similar, yet diverse manners. Examples of platforms are Windows 2003 Server, Linux, and Solaris. Version Identifier - A version date or version number. Software Categories the following list provides a categorization of software referenced in this SOP: Category 1 - Operating Systems Category 2 - Standard Instruments, Micro Controllers, Smart Instrumentation Category 3 - Standard Software Packages Category 4 - Configurable Software Packages Category 5 - Application Specific or Custom Built Software

Title Configuration Management SOP 1.0 Commercial in Confidence 08-Aug-2006 5 of 7 Client the business system owner is typically the line manager responsible for the business process where the computer system will be used. Validation Group the group responsible for ensuring that computer systems are implemented and maintained in a validated state. IT Group the group responsible for development, operation, and maintenance of computer systems. 1.4 Responsibility Validation and the other disciplines listed within this SOP are responsible for ensuring this procedure is followed. It is the responsibility of the IT groups to ensure that source code, object code and other software components are maintained under proper configuration control. 1.5 References Document ID SOP_0102 Title Document Standards SOP 2 Configuration Management Plan Contents - Procedure The Configuration Management Plan must be prepared according to the general format requirements defined in SOP SOP_0102 Documentation Standards. A Configuration Management Plan is developed for each unique computer system that would define for each application the specific process for controlling the application elements. A software system that functionally provides configuration management should be employed. Where a suitable software product is not available, access security must be restricted to prevent write/update privilege on the test and production baseline libraries to members of the IT Group who are responsible for maintaining configuration control.

1.0 Commercial in Confidence 08-Aug-2006 6 of 7 2.1 Configuration Management Plan Title 2.2 Approval Give the configuration management plan a descriptive title that uniquely identifies the system. At the beginning of the configuration management plan an approval section is required. This section will contain a table for signatures. The table of signatures must provide for the following information to be captured: 1. The department or function of the signatory; 2. The name of the signatory; 3. A space to record the signature, and; 4. A space to record the date of the signature. The section must contain a statement informing the reviewer that signing this document infers that they have read, understood and agree with the contents of the plan. Normally this information is collected on the approval page of the plan. 2.3 Environment identification Describe the hardware including the model number, operating system version, and vendor. Also include change control product names and release numbers. 2.4 Application Configuration Items 2.5 Baselines Identify the specific type or group of configuration elements that comprise the application and are defined as requiring configuration control. Provide a description of the baselines (i.e. unit, system, production) from an environment perspective (hardware & software). Provide a description of the tools necessary for managing/controlling the baseline. Provide a description of the location of system configuration element (or libraries) for each baseline.

1.0 Commercial in Confidence 08-Aug-2006 7 of 7 2.6 Version Identifier and Version Control Control must be maintained over the various versions of configuration elements to ensure consistency and also to ensure that modifications are implemented appropriately. Each configuration element must be uniquely identified with a version number or version date before it is initially placed under change control in the test environment. Modifications to configuration elements can be approved and implemented between each baseline. A version will be incremented for configuration elements each time a modification is approved and placed under change control. The version number or version date will remain the same as the element moves from one baseline to another as long as the element has not been modified. Describe the method and format of the version numbering of elements. Describe how each element can be examined for its unique version number.