The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. /desc
Points of focus:
- Manages Changes Throughout the System Lifecycle
- Authorizes Changes
- Designs and Develops Changes
- Documents Changes
- Tracks System Changes
- Configures Software
- Tests System Changes
- Approves System Changes
- Deploys System Changes
- Identifies and Evaluates System Change
- Identifies Changes in Infrastructure, Data, Software, and Procedures Required to Remediate Incidents
- Creates Baseline Configuration of IT Technology
- Provides for Changes Necessary in Emergency Situations
- Protects Confidential Information
- Protects Personal Information
Software under development, testing and production is run in differentiated technical environments in order to ensure the quality of development work in an environment that adapts to the production environment and, on the other hand, the production environment is not disturbed by unfinished development.
Sensitive or personal data of users is not copied and used in a development environment.
The development unit itself maintains a list of criteria that need to be met before a task can be marked as completed. The criteria may include e.g. review requirements, documentation requirements and testing requirements.
New code will only be implemented after extensive testing that meets pre-defined criteria. Tests should cover usability, security, effects on other systems, and user-friendliness.
All employees handling confidential information should sign a confidentiality or non-disclosure agreement before processing confidential information.
The confidentiality commitment should include, among other things:
The requirements and needs for confidentiality agreements are reviewed and updated at regular intervals.
In systematic cyber security work, the impact of significant changes must be assessed in advance and they must be executed in a controlled way. The consequences of unintentional changes must be assessed and efforts made to mitigate possible adverse effects.
Significant changes may include: changes in the organization, operating environment, business processes and data systems. Changes can be identified e.g. through management reviews and other cyber security work.
General rules for reviewing, approving and publishing the code have been defined and enforced.
The rules may include e.g. the following things:
The rules are intended to manage the risks associated with the release of new program code.
Only pre-defined, authorized users are allowed to post changes to the code.
Access to source code and other related plans is controlled to prevent e.g. adding unauthorized code and avoiding unintentional changes. Access rights are allocated on a need-to-know basis and, for example, support staff are not granted unlimited access rights.
Source code control can be implemented, for example, by storing all code centrally in a dedicated source code management system.
The general rules for secure development work have been drawn up and approved by the development managers. The implementation of the rules is monitored in software development in the organization and the rules are reviewed at least yearly.
The safe development policy may include e.g. the following things:
Compliance with the rules of secure development may also be required of key partners.
Inadequate change management is a common cause of incidents for digital services.
An organization shall document the change management process that must be followed whenever significant changes are made to developed digital services or other computing services that affect cyber security. The process includes requirements e.g. for the following:
Determined system portfolio management means a clear picture of the organization's system as a whole, the benefits of different systems and future needs.
The aim of system portfolio management is to achieve e.g.:
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.