configuration management

Table of Contents

What is configuration management?

Configuration management or in English configuration management (CM) is a process for the production and maintenance of a uniform product. 

This means that all necessary information about the infrastructure or services is documented, necessary changes and adjustments are made and the information is regularly checked to ensure it is up-to-date.

In addition, it should be reproducible in the end. According to ITILv3, CM is part of the Service Transition Module. In combination with Service Asset Management, they form the Service Asset and Configuration Management (ITIL SACM) process.

You want more knowledge?
Then take a look at our knowledge base.
Here you will find further topics in the field of IT security
To the knowledge base

Why should configuration management be introduced?

A standardization of any configuration and of course the associated documentation - am best software Supported – in a configuration management database, CMDB for short, makes troubleshooting and problem solving easier. It also ensures that the security level is the same for all systems.

When a new product is introduced into the IT landscape, the time should be taken to harden the product as much as possible and to record all necessary steps in the CMDB.

This can then be used as a template for all the same products and you do not create additional errors or gaps due to non-uniform configuration.

Of course, if a system has a vulnerability, all sister systems have it, but you can also fix them all at once and not have unexpected problems with individual systems. The changes to the product are carried out and documented by change management, so that it is also possible to completely trace how long the desired behavior has changed.

Configuration Management representation Knowledge Base

See more advantages

Another advantage is that you create a reference configuration (English baseline) and have a defined status on which the entire system works together without problems. So if there are problems after changes, you always have a documented baseline to go back to. The reference configuration should be thoroughly checked or audited so that it really is a reference configuration.

There is more

Because it is standardized, you can create key performance indicators (KPI) and get better monitoring results. Unusual behavior of individual systems is noticed more quickly and supports the incident response process.

Would you like advice on the topic?
By phone or via our contact form. Contact us now!
Contact us

Summarized

CM is essential for creating a unified system as a supporting process. Because it is unified, you can create KPIs to monitor and measure.

Since measurement results are at least similar, if not the same, anomalies are noticed better and faster and you can react to them more efficiently.

So what initially seems time-consuming is in retrospect a time saver and an opportunity to improve the security level in the long term.

Configuration Management representation Knowledge Base
Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!
OTHER CONTRIBUTIONS

Table of Contents

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!