Solved

Network security questions for change control requests...

Posted on 2016-11-08
2
101 Views
Last Modified: 2016-11-14
I am putting together a list of default questions that users need to fill out to request a change to our security systems.  Here is what I have so far...

1. Is there a project associated with this change? If so, what is the project identification information?

2. What is the expected business impact of the change?

3. Provide an explanation of the requested change (what is the business case/goal for this change?):

4. Can you provide information regarding the sources/destinations requested in the change (noted below):
      Source:
      IP Address - FQDN - Type of server
      Example:
            192.168.1.100 - windows001.example.com - Microsoft Web Server
      Destination:
      IP Address - FQDN - Type of server
      Example:
            172.16.1.100 - windows095.example.com - Microsoft SQL Server

5. Can you provide an explanation for each port/port range requested in the change.  Also, please       specify if the port is either TCP or UDP.
      Ports:
      TCP/UDP - Port # - Reason needed for port
      Example:
            TCP - 1433 - This port is required to allow the DMZ server connect to the MSSQL database instance on the internal server.

6. What is the timetable for this change?
0
Comment
Question by:Michael Kowalski
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 22

Accepted Solution

by:
eeRoot earned 500 total points
ID: 41882196
A few other things to ask:

1) Has the change been tested on a test system?

2) Is there any expected down time for the change window?  If so, what systems will be impacted and who needs to be notified?

3) Is there a rollback plan in case the change is unsuccessful?

4) Who is the owner of the systems be impacted and do they approve the change?
0
 

Author Closing Comment

by:Michael Kowalski
ID: 41886260
Thank you for your input.  This is very useful.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ready for our next Course of the Month? Here's what's on tap for June.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question