Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
2016 DBIR noted that miss-configured IT systems were the route that hackers took to exploit IT systems
across thousands of companies.
In 2015 PWC report indicating that “poor system configurations were the cause of major breaches”, in a
survey they conducted of over 1000 IT and Cybersecurity professionals.
OPM Breach 2016. Inspector General & Congressional Oversight committee report that “OPM wasn't
even sure of what it had on its network”. "OPM does not maintain a comprehensive inventory of servers,
databases, and network devices”.
HP Cyber Risk Report. “Server misconfigurations were the number one vulnerability”.
“Over and above vulnerabilities such as privacy and cookie security issues, server misconfigurations
dominated the list of security concerns, providing adversaries unnecessary access to files that leave an
organization susceptible to an attack”.
2015-States responsible for IT configuration of IT Systems. “Misconfigured database has led to the
disclosure of 191 million voter records”.
Leveraging Change Control for Security
Leveraging Change Control for Security
The ability to create, edit and manage
IT security hardening policies in a way that
fits real-world business processes and
continually balances risk and productivity
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
CYBERSECURITY CONFIGURATION CONSIDERATIONS
 Ensure change control processes cover desktops, servers,
networks, applications, databases.
 Invest in automated capabilities to assess, monitor, and
enforce.
 Leverage dynamic white-listing to ensure applications and
system remain compliant and secure.
CYBERSECURITY CONFIGURATION CONSIDERATIONS
 Continuous monitoring of all change requests can help
prevent system downtime, compliance violations, and
increased risk exposure.
 A single management platform pulls together all change
control process and policy information, delivering a more
efficient and effective change management program.
 Centralized management of security, compliance, and
change control process significantly lowers total cost of
ownership.
Leveraging Change Control for Security
Planning
 Identify/Assessment of High Value Assets
 System mapping
 Service mapping
ID current and future state configurations
 Prioritize the most important systems, how they are configured
and what other systems they are connected to
 Internal systems
 External systems
Governance
• Establishing appropriate organizational structures
• Roles and responsibilities
• Engage stakeholders
• Support the change effort
Business impact and value of current configurations
• Tie business services to key systems, their use and
configurations
Implementation
• Identification of needed changes from old and new
systems
Operations
• Monitor, update and secure each system (the
process)
Evaluate business risk
• Impact of both doing and not doing the change
• Analyze timing of the change to resolve any
conflicts and minimize impact
Evaluate business risk (cont.)
• Ensure all affected parties are aware of the change
and understand its impact
• Determine if the implementation of the change
conflicts with the business cycle
• Ensure current business requirements and objectives
are met
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
Leveraging Change Control for Security
tripwire.com | @TripwireInc
Questions Answers
The Onion? Seriously? Well, not quite seriously. The story, though
published in the Onion, was meant to show just
how far cyberwar has come…far enough to make
fun of it!
How is version control integrated into configuration
management in a DevOps environment?
Really two sides to this coin – having configurations
that are prebuilt: gold images, recipes/scripts where
those configurations are under version control is
probably the first use case. Version control gives
you the fine grained ability to see and control
change, but it does not give you the ability to
compare those configurations under control to a
secured standard or internally created policy. Here,
configuration management can help keep those
version controlled items at a state that is secure
and known to work properly, and alert when
changes to them open up risk.
Leveraging Change Control for Security
Leveraging Change Control for Security
Documentation – Identify the information relevant to a specific
change that needs to be collected throughout the change management
process.
• Continuous Oversight – Change Advisory Board (CAB) The CAB is tasked
with balancing the need for change with the need to minimize risks.
• Formal, Defined Approval Process – All changes will follow the established
multiple level approval process to ensure routine changes are completed
with minimum restrictions while complex, high impact changes receive the
oversight necessary to guarantee success.
• Scope – Establish the specific areas that this policy will cover. Examples include
Payroll and HR Applications, E-Commerce and Store Applications, Purchase Applications, Supply Chain Applications, Accounting
and Business Applications, Logistic Applications groups. Also included are all changes associated with the Software
Development Life Cycle (SDLC) program, hardware and software changes.
and/or Client Impact
High (4) – Impacts several internal and/or external customers, major disruption to
critical systems or impact to mission critical services.
Moderate (3) – Impacts several internal customers, significant disruption to
critical systems or mission critical services.
Low (2) – Impacts a minimal number of internal customers, minimal impact to a
portion of a business unit or non- critical service.
No Risk (1) – No impact to internal customers, as well as no impact to critical
systems or services.
Risk levels
IT Resource Impact
High (4) – Involves IT resources from more than two workgroups and crosses IT
divisions or involves expertise not currently staffed.
Moderate (3) – Involves IT resources from more than two workgroups within the
same IT division or involves expertise that has limited staffing.
Low (2) – Involves IT resources from one workgroup within same IT division.
No Risk (1) – Involves a single IT resource from a workgroup.
Risk levels
Implementation Complexity
High (4) – High complexity requiring technical and business coordination.
Moderate (3) – Significant complexity requiring technical coordination only.
Low (2) – Low complexity requiring no technical coordination.
No Risk (1) – Maintenance type of change
Risk levels
Duration of Change
High (4) – Change outage greater than 1 hour and affecting clients during
Prime/Peak times.
Lengthy install and back-out.
Moderate (3) – Change outage less than 1 hour during Prime/Peak times or
greater then 1 hour during Non-Prime times.
Low (2) – Change outage less than 1 hour during Non-Prime times and affecting
clients during Non-Prime times.
No Risk (1) – No outage expected.
Risk levels
Security
High (4) – Affects critical data or server security and the back-out would likely
extend the window timeframe.
Moderate (3) – Affects non-critical data or server security and has a moderate
back-out plan which would not extend window timeframe.
Low (2) – No security issues and easy back-out plan.
No Risk (1) – No back-out plan needed.
Risk levels
Service Level Agreement Impact
High (4) – Impacts SLA during business Prime/Peak times.
Moderate (3) – Impacts SLA during business Non-Prime times.
Low (2) – Little measurable effect on SLA times.
Risk levels

More Related Content

PDF
Keep Your Guard: Stay Compliant and Be Secure
PPTX
Tripwire IP360 Vulnerability Management
PPTX
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
PDF
Growing Pains for Human Resources
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPTX
SIEM Alone is Not Enough
PPTX
SIEM in NIST Cyber Security Framework
PDF
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
Keep Your Guard: Stay Compliant and Be Secure
Tripwire IP360 Vulnerability Management
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Growing Pains for Human Resources
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
SIEM Alone is Not Enough
SIEM in NIST Cyber Security Framework
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security

What's hot (20)

PPTX
Cybersecurity Metrics: Reporting to BoD
PPTX
I.T. Geeks Can't Talk to Management
PPTX
Adapt or Die: The Evolution of Endpoint Security
PPTX
Prioritizing an audit program using the 20 critical controls
PDF
Tripwire enterprise 87_datasheet
PDF
A Case Study of the Capital One Data Breach
PDF
IT Risk Management
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PPTX
QSA Shares PCI 3.0 Advice & Checklist
PPTX
Information Security Management
PPTX
IT Governance Roles and Data Governance - Hernan Huwyler
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PPTX
Logging, monitoring and auditing
PPTX
Cyber Security in the Digital Age: A Survey and its Analysis
PPTX
Practical steps for assessing tablet & mobile device security
PPSX
Next-Gen security operation center
PDF
Integrating Cybersecurity into Supply Chain Risk Management
PPTX
Risk Management Approach to Cyber Security
PPTX
Why Patch Management is Still the Best First Line of Defense
PPTX
More practical insights on the 20 critical controls
Cybersecurity Metrics: Reporting to BoD
I.T. Geeks Can't Talk to Management
Adapt or Die: The Evolution of Endpoint Security
Prioritizing an audit program using the 20 critical controls
Tripwire enterprise 87_datasheet
A Case Study of the Capital One Data Breach
IT Risk Management
Top 20 Security Controls for a More Secure Infrastructure
QSA Shares PCI 3.0 Advice & Checklist
Information Security Management
IT Governance Roles and Data Governance - Hernan Huwyler
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Logging, monitoring and auditing
Cyber Security in the Digital Age: A Survey and its Analysis
Practical steps for assessing tablet & mobile device security
Next-Gen security operation center
Integrating Cybersecurity into Supply Chain Risk Management
Risk Management Approach to Cyber Security
Why Patch Management is Still the Best First Line of Defense
More practical insights on the 20 critical controls
Ad

Viewers also liked (20)

PPTX
PCI Change Detection: Thinking Beyond the Checkbox
PPTX
Taking the Pain out of PCI Compliance
PPTX
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
PPTX
Tripwire University Boot Camp – Economy of Bad
PPTX
Survival of the Fittest: How to Build a Cyber Resilient Organization
PPTX
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
PPTX
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
PPTX
8 Tips on Creating a Security Culture in the Workplace
PPTX
Threat Intelligence from Honeypots for Active Defense
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
An Essential Guide to EU GDPR
PPTX
Achieving Continuous Monitoring with Security Automation
PPTX
Breaking In and Breaking Records – A Look Back at 2016 Cybercrimes
PDF
How to Protect Your Organization from the Ransomware Epidemic
PPTX
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
PPTX
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
PPTX
3 Success Stories on the Tripwire Enterprise Journey
PPTX
Mastering Advanced Security Profiling Language (ASPL)
PPTX
Building a Business Case for Credentialed Vulnerability Scanning
PPTX
How to Improve Your Board’s Cyber Security Literacy
PCI Change Detection: Thinking Beyond the Checkbox
Taking the Pain out of PCI Compliance
Tripwire University Boot Camp – The Shifting Landscape: Know Your Battlefield
Tripwire University Boot Camp – Economy of Bad
Survival of the Fittest: How to Build a Cyber Resilient Organization
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
8 Tips on Creating a Security Culture in the Workplace
Threat Intelligence from Honeypots for Active Defense
"Backoff" Malware: How to Know If You're Infected
An Essential Guide to EU GDPR
Achieving Continuous Monitoring with Security Automation
Breaking In and Breaking Records – A Look Back at 2016 Cybercrimes
How to Protect Your Organization from the Ransomware Epidemic
Excellence in the Essentials: It's Not Whether You Implement Foundational Con...
Overload: Critical Lessons from 15 Years of ICS Vulnerabilities
3 Success Stories on the Tripwire Enterprise Journey
Mastering Advanced Security Profiling Language (ASPL)
Building a Business Case for Credentialed Vulnerability Scanning
How to Improve Your Board’s Cyber Security Literacy
Ad

Similar to Leveraging Change Control for Security (20)

PPTX
Optimize Change Management
PPTX
ITIL Best Practice for Software Companies
PPT
Change Management - ITIL
PPT
Itilv3
PPT
Itilv3
PPTX
IT Risk Management
PPT
ITIL - introduction to ITIL
PPT
Tatakelola TI Menggunakan Framework ITIL V3
PPTX
IT Infrastructure @ Essar Oil Ltd.(ITIL)
PPT
ITIL V3 by Jisu Dasgupta
PPTX
Configuration Managment Powerpoint
PPT
5 service transition
PPT
5 service transition
PPTX
Itil prc review
PPT
Service transition
PPT
PPT
ITIL Practical Guide - Service Transition
PPT
IS Change& knowledge Management Processes AwarnessTraining PPT June 2023-draf...
PPT
PPT
Numara change & approval mgmt
Optimize Change Management
ITIL Best Practice for Software Companies
Change Management - ITIL
Itilv3
Itilv3
IT Risk Management
ITIL - introduction to ITIL
Tatakelola TI Menggunakan Framework ITIL V3
IT Infrastructure @ Essar Oil Ltd.(ITIL)
ITIL V3 by Jisu Dasgupta
Configuration Managment Powerpoint
5 service transition
5 service transition
Itil prc review
Service transition
ITIL Practical Guide - Service Transition
IS Change& knowledge Management Processes AwarnessTraining PPT June 2023-draf...
Numara change & approval mgmt

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Configure Apache Mutual Authentication
PDF
4 layer Arch & Reference Arch of IoT.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Internet of Everything -Basic concepts details
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
STKI Israel Market Study 2025 version august
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
What is a Computer? Input Devices /output devices
Custom Battery Pack Design Considerations for Performance and Safety
NewMind AI Weekly Chronicles – August ’25 Week III
Configure Apache Mutual Authentication
4 layer Arch & Reference Arch of IoT.pdf
search engine optimization ppt fir known well about this
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Microsoft Excel 365/2024 Beginner's training
Enhancing plagiarism detection using data pre-processing and machine learning...
Getting started with AI Agents and Multi-Agent Systems
Internet of Everything -Basic concepts details
CloudStack 4.21: First Look Webinar slides
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
A proposed approach for plagiarism detection in Myanmar Unicode text
STKI Israel Market Study 2025 version august
Build Your First AI Agent with UiPath.pptx
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Comparative analysis of machine learning models for fake news detection in so...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
What is a Computer? Input Devices /output devices

Leveraging Change Control for Security

  • 4. 2016 DBIR noted that miss-configured IT systems were the route that hackers took to exploit IT systems across thousands of companies. In 2015 PWC report indicating that “poor system configurations were the cause of major breaches”, in a survey they conducted of over 1000 IT and Cybersecurity professionals. OPM Breach 2016. Inspector General & Congressional Oversight committee report that “OPM wasn't even sure of what it had on its network”. "OPM does not maintain a comprehensive inventory of servers, databases, and network devices”. HP Cyber Risk Report. “Server misconfigurations were the number one vulnerability”. “Over and above vulnerabilities such as privacy and cookie security issues, server misconfigurations dominated the list of security concerns, providing adversaries unnecessary access to files that leave an organization susceptible to an attack”. 2015-States responsible for IT configuration of IT Systems. “Misconfigured database has led to the disclosure of 191 million voter records”.
  • 7. The ability to create, edit and manage IT security hardening policies in a way that fits real-world business processes and continually balances risk and productivity
  • 11. CYBERSECURITY CONFIGURATION CONSIDERATIONS  Ensure change control processes cover desktops, servers, networks, applications, databases.  Invest in automated capabilities to assess, monitor, and enforce.  Leverage dynamic white-listing to ensure applications and system remain compliant and secure.
  • 12. CYBERSECURITY CONFIGURATION CONSIDERATIONS  Continuous monitoring of all change requests can help prevent system downtime, compliance violations, and increased risk exposure.  A single management platform pulls together all change control process and policy information, delivering a more efficient and effective change management program.  Centralized management of security, compliance, and change control process significantly lowers total cost of ownership.
  • 14. Planning  Identify/Assessment of High Value Assets  System mapping  Service mapping ID current and future state configurations  Prioritize the most important systems, how they are configured and what other systems they are connected to  Internal systems  External systems
  • 15. Governance • Establishing appropriate organizational structures • Roles and responsibilities • Engage stakeholders • Support the change effort Business impact and value of current configurations • Tie business services to key systems, their use and configurations
  • 16. Implementation • Identification of needed changes from old and new systems Operations • Monitor, update and secure each system (the process) Evaluate business risk • Impact of both doing and not doing the change • Analyze timing of the change to resolve any conflicts and minimize impact
  • 17. Evaluate business risk (cont.) • Ensure all affected parties are aware of the change and understand its impact • Determine if the implementation of the change conflicts with the business cycle • Ensure current business requirements and objectives are met
  • 27. Questions Answers The Onion? Seriously? Well, not quite seriously. The story, though published in the Onion, was meant to show just how far cyberwar has come…far enough to make fun of it! How is version control integrated into configuration management in a DevOps environment? Really two sides to this coin – having configurations that are prebuilt: gold images, recipes/scripts where those configurations are under version control is probably the first use case. Version control gives you the fine grained ability to see and control change, but it does not give you the ability to compare those configurations under control to a secured standard or internally created policy. Here, configuration management can help keep those version controlled items at a state that is secure and known to work properly, and alert when changes to them open up risk.
  • 30. Documentation – Identify the information relevant to a specific change that needs to be collected throughout the change management process. • Continuous Oversight – Change Advisory Board (CAB) The CAB is tasked with balancing the need for change with the need to minimize risks. • Formal, Defined Approval Process – All changes will follow the established multiple level approval process to ensure routine changes are completed with minimum restrictions while complex, high impact changes receive the oversight necessary to guarantee success. • Scope – Establish the specific areas that this policy will cover. Examples include Payroll and HR Applications, E-Commerce and Store Applications, Purchase Applications, Supply Chain Applications, Accounting and Business Applications, Logistic Applications groups. Also included are all changes associated with the Software Development Life Cycle (SDLC) program, hardware and software changes.
  • 31. and/or Client Impact High (4) – Impacts several internal and/or external customers, major disruption to critical systems or impact to mission critical services. Moderate (3) – Impacts several internal customers, significant disruption to critical systems or mission critical services. Low (2) – Impacts a minimal number of internal customers, minimal impact to a portion of a business unit or non- critical service. No Risk (1) – No impact to internal customers, as well as no impact to critical systems or services. Risk levels
  • 32. IT Resource Impact High (4) – Involves IT resources from more than two workgroups and crosses IT divisions or involves expertise not currently staffed. Moderate (3) – Involves IT resources from more than two workgroups within the same IT division or involves expertise that has limited staffing. Low (2) – Involves IT resources from one workgroup within same IT division. No Risk (1) – Involves a single IT resource from a workgroup. Risk levels
  • 33. Implementation Complexity High (4) – High complexity requiring technical and business coordination. Moderate (3) – Significant complexity requiring technical coordination only. Low (2) – Low complexity requiring no technical coordination. No Risk (1) – Maintenance type of change Risk levels
  • 34. Duration of Change High (4) – Change outage greater than 1 hour and affecting clients during Prime/Peak times. Lengthy install and back-out. Moderate (3) – Change outage less than 1 hour during Prime/Peak times or greater then 1 hour during Non-Prime times. Low (2) – Change outage less than 1 hour during Non-Prime times and affecting clients during Non-Prime times. No Risk (1) – No outage expected. Risk levels
  • 35. Security High (4) – Affects critical data or server security and the back-out would likely extend the window timeframe. Moderate (3) – Affects non-critical data or server security and has a moderate back-out plan which would not extend window timeframe. Low (2) – No security issues and easy back-out plan. No Risk (1) – No back-out plan needed. Risk levels
  • 36. Service Level Agreement Impact High (4) – Impacts SLA during business Prime/Peak times. Moderate (3) – Impacts SLA during business Non-Prime times. Low (2) – Little measurable effect on SLA times. Risk levels