SHREE LEARNING ACADEMY
Techincal Change Management | CompTIA Security+ 701
In the fast-paced world of technology, change is inevitable. Systems, software, and hardware constantly evolve to meet user demands and technological advancements. However, implementing these changes without proper management can lead to chaos and disruptions. This is where Technical Change Management comes into play. It is the process of effectively planning, implementing, and controlling changes in technical environments to minimize risks and ensure smooth transitions.
Allow Lists and Deny Lists: Controlling Access
Allow lists and deny lists control access to resources. They determine who gets in and who doesn’t, similar to a bouncer at a nightclub.
Example: A company can create an allow list specifying which employees can access sensitive files, ensuring only authorized personnel can view or modify data.
Restricted Activities: Setting Boundaries
Restricted activities define what actions can or cannot be taken during a change process, ensuring system stability and security.
Example: During a software update, configuration changes may be restricted to prevent disruptions.
Downtime: Minimizing Disruptions
Downtime is the period when a system is unavailable. Proper planning ensures minimal business interruptions.
Example: A website undergoing maintenance can be scheduled during off-peak hours to reduce the impact on users.
Service Restart: Refreshing the System
Some changes require restarting services or applications to apply updates.
Example: Installing security patches on a server may require restarting services to apply the updates properly.
Application Restart: Refreshing Individual Components
Application restarts ensure that updates or changes take effect properly.
Example: Upgrading a CRM software may require restarting the application to activate new features.
Legacy Applications: Dealing with the Old
Legacy applications are outdated software still in use due to cost, compatibility, or other constraints.
Example: A company may continue using old accounting software due to the high cost of migration.
Dependencies: Understanding Interconnections
Dependencies refer to how different components or systems rely on each other.
Example: A web application may depend on a database server; any change to one must consider the impact on the other.
Documentation: Recording Information
Documentation provides a reference point for stakeholders, offering clarity on systems and processes.
Example: Just like blueprints guide builders, system documentation helps IT teams understand how systems operate.
Updating Diagrams
Diagrams visually represent system components and relationships, aiding communication and understanding.
Why Update Diagrams?
- Reflecting Changes: Keeps stakeholders updated on system modifications.
- Enhancing Understanding: Reduces misunderstandings and improves collaboration.
- Supporting Decision-Making: Provides insights for better planning.
Example: A software team updates system diagrams as new features are added to an e-commerce platform.
Updating Policies and Procedures
Policies and procedures ensure consistency and efficiency in operations.
Why Update Policies and Procedures?
- Adapting to Change: Aligns with new technologies and regulations.
- Maintaining Compliance: Prevents legal or regulatory issues.
- Improving Efficiency: Incorporates process improvements and automation.
Example: Updating cybersecurity policies to address emerging threats and vulnerabilities.
Version Control: Managing Changes
Version control tracks changes to documents or code over time, enhancing collaboration and accountability.
Why Use Version Control?
- Tracking Changes: Identifies who made modifications and when.
- Reverting to Previous Versions: Restores files if errors occur.
- Facilitating Collaboration: Supports concurrent editing by multiple users.
Example: Software developers use Git to manage source code, track changes, and collaborate efficiently.
Conclusion
Technical Change Management ensures that changes are managed with precision and foresight. By addressing aspects such as allow lists, restricted activities, downtime, dependencies, and documentation, organizations can implement changes effectively, minimize risks, and drive business growth and innovation.
Test Yourself
Take Free Quiz
Watch our Video Tutorial