Solved

config management

Posted on 2014-02-17
3
175 Views
Last Modified: 2014-03-06
if you outsource you IT service to a 3rd party, can you give a heads up on any risks if they have poor configuration management processes, its purported as a huge risk, but I could do with a practical heads up of having a poor configuration management procedures for your IT environment/infrastructure, especially if IT is outsourced.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
agonza07 earned 500 total points
ID: 39866511
Depends on the policies and procedures already in place from the 3rd party. As for the peace of mind that the configuration was done properly, you're talking about auditing their practices, so again you would have to check what kind of safeguards they have in place.

What you really want is a 3rd party with plenty of experience and a good already established practice...which is going to cost you.

There's change management software out there that can alert you as to when configs change, but the part about determining whether the configuration is good or not involved more human interaction and as the old adage goes... "to err is human."
0
 
LVL 3

Author Comment

by:pma111
ID: 39866763
thanks, but whats the risk to you as a company of your IT section is performing (if at all) poor configuration management?
0
 
LVL 20

Expert Comment

by:agonza07
ID: 39867830
Could pose security holes or even possible downtime if proper change management is not conducted. For example, our firewalls, if a junior tech decides to go in and make unauthorized and/or verified changes during business hours and they inadvertedly take it down or open a security hole, that's the risk you take.
0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question