Configuration Management: Using COBIT 5

  • 1h 4m
  • ISACA
  • ISACA
  • 2013

Enterprises continuously experience changes; driven by both external and internal forces. When changes occur in one part of the enterprise without proper communication and coordination, signs of malfunction are likely to manifest as business disruptions, inefficiencies and potential financial losses.

Configuration management (CM) reduces the risk of these malfunctions as part of a strategy to manage internal enterprise changes and minimize unforeseen impacts.

The purpose of this publication is to help enterprises create a homogenous view of CM and implement a sustainable process. This publication describes the most important challenges and formulates mitigating actions that are supported by COBIT 5 practices to manage configuration successfully.

In this Book

  • Configuration Management—Using COBIT 5
  • Introduction
  • Configuration Management
  • CMDB
  • Risk And Threats Related To CM
  • CM Mitigating Actions
  • Continuous Improvement To Develop A Capable CM Process And Other Enablers
  • High-Level Mapping Of COBIT 5 And ITIL V3 For CM
  • Glossary
  • References
  • Implementation Project Plan Example
  • Audit Checklist Examples
  • Data Design Template For A Data Design Model
  • COBIT 5 Processes For Governance Of Enterprise IT
  • BAI10 Manage Configuration Inputs And Outputs
  • Mapping Threats and Mitigating Actions Using COBIT 5
  • CM Standards And Certifications
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.6 of 2143 users Rating 4.6 of 2143 users (2143)