Solved

Network security questions for change control requests...

Posted on 2016-11-08
2
37 Views
Last Modified: 2016-11-14
I am putting together a list of default questions that users need to fill out to request a change to our security systems.  Here is what I have so far...

1. Is there a project associated with this change? If so, what is the project identification information?

2. What is the expected business impact of the change?

3. Provide an explanation of the requested change (what is the business case/goal for this change?):

4. Can you provide information regarding the sources/destinations requested in the change (noted below):
      Source:
      IP Address - FQDN - Type of server
      Example:
            192.168.1.100 - windows001.example.com - Microsoft Web Server
      Destination:
      IP Address - FQDN - Type of server
      Example:
            172.16.1.100 - windows095.example.com - Microsoft SQL Server

5. Can you provide an explanation for each port/port range requested in the change.  Also, please       specify if the port is either TCP or UDP.
      Ports:
      TCP/UDP - Port # - Reason needed for port
      Example:
            TCP - 1433 - This port is required to allow the DMZ server connect to the MSSQL database instance on the internal server.

6. What is the timetable for this change?
0
Comment
Question by:Michael Kowalski
2 Comments
 
LVL 22

Accepted Solution

by:
eeRoot earned 500 total points
ID: 41882196
A few other things to ask:

1) Has the change been tested on a test system?

2) Is there any expected down time for the change window?  If so, what systems will be impacted and who needs to be notified?

3) Is there a rollback plan in case the change is unsuccessful?

4) Who is the owner of the systems be impacted and do they approve the change?
0
 

Author Closing Comment

by:Michael Kowalski
ID: 41886260
Thank you for your input.  This is very useful.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now