 What is Code Change Management and why does it matter?  What are key code change controls and their relationship?  What are some common code change.

Slides:



Advertisements
Similar presentations
Course Material Overview of Process Safety Compliance with Standards
Advertisements

Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
ITIL: Service Transition
Software Quality Assurance Inspection by Ross Simmerman Software developers follow a method of software quality assurance and try to eliminate bugs prior.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Office of Inspector General (OIG) Internal Audit
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Managing Project Risk.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Purpose of the Standards
Session 3 – Information Security Policies
BRIEFING TO THE PORTFOLIO COMMITTEE ON THE DPSA’S RISK MANAGEMENT STRATEGY PRESENTATION TO THE PORTFOLIO COMMITTEE 12 MAY
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Introduction to Computer Technology
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
What is Business Analysis Planning & Monitoring?
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
“Here’s why you need the new wheels, too…” Shawn and Steve Image from
The Key Process Areas for Level 2: Repeatable Ralph Covington David Wang.
Condor Technology Solutions, Inc. Grace RFTS Application Extension Phase.
University of Palestine software engineering department Testing of Software Systems Fundamentals of testing instructor: Tasneem Darwish.
CPIS 357 Software Quality & Testing I.Rehab Bahaaddin Ashary Faculty of Computing and Information Technology Information Systems Department Fall 2010.
Module CC3002 Post Implementation Issues Lecture for Week 6 AY 2013 Spring.
Security Assessments FITSP-A Module 5
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
PROJECT RISK MANAGEMENT Presentation by: Jennifer Freeman & Carlee Rosenblatt
Software Testing Life Cycle
Testing – A Methodology of Science and Art. Agenda To show, A global Test Process which work Like a solution Black Box for an Software Implementation.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Service Transition & Planning Service Validation & Testing
1 Systems Analysis & Design Systems Implementation & Support IS 431: Lecture 11 CSUN Information Systems.
Software Project Management
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
The views expressed in this presentation do not necessarily reflect those of the Federal Reserve Bank of New York or the Federal Reserve System Association.
Change and Patch Management Controls
1 Implementing a Business Management System compliant to ISO 9001:2000.
The Traditional System Development Life Cycle There are a number of important steps in the creation of a system, regardless of which approach you use.
Managing Change 1. Why Do Requirements Change?  External Factors – those change agents over which the project team has little or no control.  Internal.
IT Controls Global Technology Auditing Guide 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
LOGO TESTING Team 8: 1.Nguyễn Hoàng Khánh 2.Dương Quốc Việt 3.Trang Thế Vinh.
Introduction to Project Management Chapter 9 Managing Project Risk
State of Georgia Release Management Training
Internal and external quality evaluation of internal audit in public sector in Ukraine Maxim Timokhin, Head of CHU, Public Financial Inspection, Ukraine.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
CS223: Software Engineering Lecture 32: Software Maintenance.
Project Management Methodology Project Closing. Project closing stage Must be performed for all projects, successfully completed or shut off by management.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Configuration Control (Aliases: change control, change management )
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
USDA 2016 Financial Management Training Transforming Shared Services Change Management Presented by Ron Gros.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
ITIL: Service Transition
An Overview on Risk Management
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
National Standards for Athletic Coaches
Documentation control
BA Continuum India Pvt Ltd
Software Configuration Management
APPLICATION RISK AND CONTROLS
IT Service Operation - purpose, function and processes
Division of powers between IA, SAI and FI
Description of Revision
The Software Development Process
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

 What is Code Change Management and why does it matter?  What are key code change controls and their relationship?  What are some common code change control gaps? Part 5 - Evaluating Code Change Management Processes

 The goal of code change management is to provide a disciplined process for introducing required code changes into the IT environment securely and with minimal disruption to ongoing operations. Purpose of Management of Code Change Review

 Development – Testing – Production environments should be separated  Staging environment for user acceptance testing Code Change Environments

 Control migration between environments  Maintain segregation of duties Code Environment Migrations

Management of Code Changes’ Equation

 Request/System Development Methodology (SDM) –Initiated through a controlled request and/or SDM process  Tested –IT and/or functional users perform documented testing of functionality and stability  Approved – Functional and/or IT owners approve prior to being moved into production.  Monitored – Systems and processes are monitored to confirm code changes follow the controlled process Four Components of a Strong Code CM Process

 Prevention controls – Testing and Approval/Authorization  Detection controls – Monitoring  Efficiency controls - Request/SDM Control Types: Prevention & Detection

 Segregation of Duties (SOD) – Separation of activities that prevent users from making inappropriate/unauthorized changes  Systematic and organizational SOD required Code Change Management - Segregation of Duties

 Prevention controls require SOD: Development access ≠ access to migrate to production (i.e., Change Coordinator) Development access ≠ code change approver Segregation of Duties – Prevention Controls

 Detection (monitoring) controls SOD : Segregation of Duties – Detection Controls ◦ Development/Migration ≠ Monitoring of code change ◦ Development/Migration ≠ access to the code change log or to enable/disable logging

Environment Segregation of Duties and Roles

 Source code - program instructions usable by developers  Source code compiles into object code/executable  Compilation may occur in any environment  NOT all code must compile (e.g., asp) Migration Process Revisited – Source vs. Executable

Migration Process – Source vs. Executable Diagram

When to Compile – Environments & Segregation of Duties Making Change

 How was timing of compiling significant?  What was the problem with the developer having access only to the source code in Test or Production?  What could be a problem if the unit tester and developer are the same individual? Change Demonstration - Lessons Learned

Source Code Escrow Agreement  A third party holder of source code  Provides source in the event software is no longer supported  Only required if source code not available

 Must confirm what code change processes exist for ALL change types  Example code change types: Program Development/Acquisition - Projects Program Code Change – Enhancement Program Code Change – Bug Fix Maintenance - Technical changes Emergency Code Changes Configuration/Parameter Code Changes Types of Code Changes

 Emergency code change procedures should still maintain some SOD  Full review and approvals post implementation Emergency Code Changes

 Testing of ‘unrelated’ functionality with test data  Required for larger enhancements or projects  Conducted in test or staging environment Regression Testing

Find the Findings Scenario Game!!

 What strategies seemed to identify the most controls/findings?  What made your scenario an effective/ ineffective code change management environment?  What control(s) could have been added? Scenario Game - Lessons Learned

1. A culture that embraces change management 2. Monitor, audit, and document all changes 3. Zero tolerance for unauthorized changes 4. Specific, defined consequences for unauthorized changes 5. Test all changes in a preproduction environment before implementing into production 6. Ensure preproduction environment matches production environment 7. Track and analyze change successes and failures to make future change decisions Seven Habits of Highly Effective IT Organizations