
The Role of Change Management in Cybersecurity
Change is the nemesis of IT and cybersecurity professionals who need to maintain a secure and available environment. No matter how secure your environment is, a single bad change is all it takes to open the door to a bad actor.
Unauthorized, unexpected, and unwanted changes to critical files, systems, and devices can quickly open a gaping hole in an organization’s cybersecurity posture. At that point, it doesn’t matter how good the rest of its controls are—a breach may be imminent.
What is a Change?
Everything that happens in an IT environment (good or bad) starts with a change: a file, configuration setting, or device is altered, deleted, added to, or even just read by a user or service.
Every bad thing in an organization’s environment begins with change — but so does every good thing. The challenge lies in determining the difference. This is also where a trusted baseline comes (Read more...)
*** This is a Security Bloggers Network syndicated blog from Cimcor Blog authored by Jacqueline von Ogden. Read the original post at: https://www.cimcor.com/blog/the-role-of-change-in-cybersecurity