HOME

TheInfoList



OR:

Change management auditing is the process by which companies can effectively manage change within their
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology system ...
systems. Changes to computer
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
must be monitored in order to reduce the risk of data loss, corruption, malware, errors, and security breaches.


Change risks

Proper change control auditing can lower the following risks: *
Security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
features of the network turn off. * Harmful code is distributed to users. * Sensitive
data In the pursuit of knowledge, data (; ) is a collection of discrete values that convey information, describing quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpret ...
is lost or becomes insecure. *
Financial report Financial statements (or financial reports) are formal records of the financial activities and position of a business, person, or other entity. Relevant financial information is presented in a structured manner and in a form which is easy to un ...
errors occur.


Control procedure

The following features are commonly part of a change management auditing procedure: ;
Change management Change management (sometimes abbreviated as CM) is a collective term for all approaches to prepare, support, and help individuals, teams, and organizations in making organizational change. It includes methods that redirect or redefine the use o ...
procedures are formally documented and controlled. ;Changes are requested in a formal process. : Requests are recorded and stored for reference. ;The effect of the requested change is assessed.:Each change is assessed based on its projected effect to the computer system and business operations. The assessment is documented with the request. : Priority is based on urgency, potential benefits, and the ease with which changes can be corrected. ;Controls are imposed on changes.:Changes are limited by automated or manual controls. In particular, unauthorized changes are periodically searched for. ;An emergency change process is in place.:Policies clearly define emergency changes. Generally, these are errors that significantly impair system function and business operations, increase the system's vulnerability, or both. Emergency changes override some, but not all, controls. For instance, a proposed change might be documented, but not permitted without authorization. ;Change documentation is periodically updated. ;Maintenance tasks and changes are recorded. ;Controls are applied to new
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
releases.:For security, new software releases often require controls such as back ups, version control, and a secure implementation. ;Software distribution is assessed for compliance.:Software distribution is assessed for compliance with license agreements. Noncompliance can have disastrous financial and legal results. ;Changes are submitted for approval.:Proposed changes are submitted for approval after auditors have reviewed the required resources, other changes, the effect, urgency, and the system's stability. ; Duties are separated:Responsibility for creation, approval, and application are assigned to different personnel to avoid undesired changes. ;Changes are reviewed.:Changes are monitored to assess the efficacy of
change management Change management (sometimes abbreviated as CM) is a collective term for all approaches to prepare, support, and help individuals, teams, and organizations in making organizational change. It includes methods that redirect or redefine the use o ...
policies.


See also

*
Change management Change management (sometimes abbreviated as CM) is a collective term for all approaches to prepare, support, and help individuals, teams, and organizations in making organizational change. It includes methods that redirect or redefine the use o ...
*
Information technology audit An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure and business applications. The evaluation of evidence obtained determines if the infor ...
* Information technology audit - operations


References

{{reflist


External links


International Organization for Standardization (ISO)

Information Systems Audit and Control Association (ISACA)
Information technology management