Solved

config management

Posted on 2014-02-17
3
174 Views
Last Modified: 2014-03-06
if you outsource you IT service to a 3rd party, can you give a heads up on any risks if they have poor configuration management processes, its purported as a huge risk, but I could do with a practical heads up of having a poor configuration management procedures for your IT environment/infrastructure, especially if IT is outsourced.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
agonza07 earned 500 total points
ID: 39866511
Depends on the policies and procedures already in place from the 3rd party. As for the peace of mind that the configuration was done properly, you're talking about auditing their practices, so again you would have to check what kind of safeguards they have in place.

What you really want is a 3rd party with plenty of experience and a good already established practice...which is going to cost you.

There's change management software out there that can alert you as to when configs change, but the part about determining whether the configuration is good or not involved more human interaction and as the old adage goes... "to err is human."
0
 
LVL 3

Author Comment

by:pma111
ID: 39866763
thanks, but whats the risk to you as a company of your IT section is performing (if at all) poor configuration management?
0
 
LVL 20

Expert Comment

by:agonza07
ID: 39867830
Could pose security holes or even possible downtime if proper change management is not conducted. For example, our firewalls, if a junior tech decides to go in and make unauthorized and/or verified changes during business hours and they inadvertedly take it down or open a security hole, that's the risk you take.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your computer hacked? learn how to detect and delete malware in your PC
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question