Under “Change Management”, what is included in “Policies and Procedures”?
What factors should be considered under “Configuration Management”?
What factors should be considered under “Software Management”?
What factors should be considered under “O/S Management”?
What factors should be considered under “Network Management”?
outsourcing, level of operating performance (availability), access controls (pw policy), and security
IT Governancetakes what 3 forms simultaneously and work together to result in effective Change Mgmt?
SPM
(1) Structure - includes roles and responsibilities, IT org structure, CIO, expert on BoD, IT strategy committee, and IT Steering committee
- Structure involves responsibility functions like IT execs and one or more IT committees.
(2) Processes - includes activities like strategic IT planning, Service Level Agreements (SLAs) w/ 3rd party IT providers, application of COBIT/ITIL/other applicable frameworks and best practices, alignment of IT w/ enterprise goals and objectives, and governance maturity models
- Processes ensure strategic decision making and monitoring of IT effectiveness and efficiency
(3) Monitoring - involves measuring IT performance using proprietary metrics.Measures are cost-benefit and ROI, balanced scorecard, and intangible performance factors
What are 2 main purposes of IT Governance?
(1) Effectively manage IT function (plan, organize and control IT activities)
(2) Effectively mitigate IT risks
- These purposes provide assurance about quality of IT overall and over aspects like change mgmt
What is “Vulnerability Mgmt”?
Under “Vulnerability Mgmt”, where does Vulnerability exist?
What are “Application Control”?
Name the 5 Financial Transaction Functions:
(1) Initiation
(2) Authorization
(3) Record
(4) Process
(5) Report
Name example Application Controls associated w/ each of the 5 Financial Transaction Functions:
(1) Initiation – Data transmission controls – Input edits – Validations – Security (2) Authorization – Programmed transaction approvals – Restricted access to information/data files (3) Record – Database updates – Automated feeds (4) Process – Calculations and related tables – File checking – Automated restrictions to sensitive transactions (5) Report – Automated posting to subsidiary or general ledgers – Automated reporting whether commercial application or “user-defined”