Technical Change Management - CompTIA Security+ SY0-701 - 1.3

Professor Messer
1 Nov 202310:54

Summary

TLDRThis video script delves into the change control process from a technician's perspective, highlighting the complexities of implementing changes in large-scale environments with multiple devices. It discusses managing allow and deny lists, the importance of adhering to documented scopes, and the potential need for modifying the change scope to achieve the primary goal. The script also touches on minimizing downtime during changes, handling legacy applications, managing dependencies, and the necessity of ongoing documentation and version control to keep systems up-to-date and maintainable.

Takeaways

  • 🛠️ The change management process is crucial for implementing changes in large environments with numerous devices, where a simple update can become complex.
  • 🔧 Technicians play a critical role in the change control process, performing the actual changes such as updating allow or deny lists to manage application security.
  • 🚫 Technicians must adhere strictly to the change control document's scope when making updates, ensuring changes are limited to what is specified.
  • 🔄 Change control may require additional updates or scope expansion to achieve the primary goal, which should be done within established policies.
  • 📝 A well-documented change control process is essential for understanding procedures and making informed decisions when the scope of change needs adjustment.
  • 🕒 Downtime is often associated with change control, and IT professionals typically schedule changes during non-production hours to minimize impact.
  • 🔄 In 24/7 environments, change control might involve switching between primary and secondary systems to update without downtime, highlighting the importance of automation and monitoring.
  • ⚠️ Communication about potential downtime is vital; stakeholders should be informed through emails or a centralized change control calendar.
  • 🔄 Reboots may be necessary post-change to implement new configurations, which can be done at various levels, from the OS to individual services or applications.
  • 🏛️ Legacy applications present unique challenges in change control due to their long-standing use and potential lack of developer support.
  • 🔗 Managing dependencies is a significant aspect of change control, as updates to one service may necessitate changes to others, complicating the process.
  • 📚 Ongoing documentation is necessary to keep network diagrams and configurations up-to-date, reflecting the dynamic nature of change control.
  • 🔄 Version control is vital for tracking changes, managing different software versions, and reverting to previous versions if issues arise.

Q & A

  • What is the primary focus of the change control process?

    -The primary focus of the change control process is to determine what needs to change and to document the scope of the change, ensuring that technicians are limited to making only the changes specified in the change control document.

  • Why is it challenging to implement changes in an environment with a large number of devices?

    -Implementing changes in an environment with a large number of devices is challenging because what would be a simple update for a single device can turn into a very complex process due to the scale and potential interdependencies among devices.

  • What are allow lists and deny lists, and how are they commonly used in an IT environment?

    -Allow lists and deny lists are used to control which applications can run within an IT environment. An allow list specifies the applications that are permitted to run, while a deny list identifies applications that are not allowed, often due to security risks such as known vulnerabilities or malware propagation.

  • How does managing an allow list differ from managing a deny list?

    -Managing an allow list means that only the applications specifically named on the list can run, restricting everything else. In contrast, a deny list allows any application to run except for those specifically named on the list, providing more flexibility.

  • What is the significance of the change control board in the change management process?

    -The change control board is significant as it reviews and approves changes, ensuring that they are within the documented scope and that the changes are made during scheduled windows to minimize disruption.

  • Why is it important to have policies in place for making additional updates or expanding the scope of a change?

    -Policies for additional updates or scope expansion are important to ensure that technicians can make necessary modifications to complete the primary goal of a change, while still maintaining control and minimizing unintended consequences.

  • How can downtime be managed during the change control process?

    -Downtime can be managed by scheduling changes during non-production hours, using secondary systems to prevent downtime, or by communicating potential outages to all stakeholders through emails or a centralized change control calendar.

  • What is the role of rebooting in the change control process?

    -Rebooting is a part of the change control process that ensures new configurations are implemented and that the system can recover properly from a power outage. It can involve restarting the operating system, a service, or the physical device.

  • How does dealing with legacy applications complicate the change control process?

    -Legacy applications can complicate the change control process because they may no longer be supported, are often poorly documented, and may have unique dependencies or configurations that are not well understood within the organization.

  • Why is ongoing documentation important in the context of change control?

    -Ongoing documentation is crucial to keep the environment's documentation up to date, reflecting any changes made. This ensures that all stakeholders have the most current information about the network configuration, applications, and procedures.

  • What is the purpose of version control in managing changes to systems and applications?

    -Version control helps track changes made to systems and applications, allows for the management of different versions, and provides a way to revert to a previous version if necessary. It ensures transparency and accountability in the change management process.

Outlines

00:00

🛠️ Change Control Process for Technicians

This paragraph discusses the change control process from a technician's perspective, emphasizing the complexity of implementing changes in large-scale environments. It highlights the importance of managing allow and deny lists to control application usage and prevent security risks. The paragraph also explains the constraints imposed by change control boards and the necessity of adhering to documented scopes while allowing for some flexibility in certain situations. The concept of change windows and the preference for making changes during non-production hours to minimize downtime are also covered, along with strategies for managing changes in 24/7 operations, such as using primary and secondary systems to prevent downtime.

05:01

🔄 System Reboots and Legacy Application Management

The second paragraph delves into the specifics of rebooting systems as part of the change control process, which can involve restarting the operating system, a service, or an application. It touches on the importance of understanding how systems recover from power outages and the challenges of managing legacy applications that may no longer be supported. The paragraph also addresses the complexities introduced by application dependencies and the need for ongoing documentation to keep network diagrams and configurations up to date. It underscores the importance of having a detailed understanding of systems to support them effectively and the role of documentation in managing change control.

10:02

📊 Version Control and Documentation in Change Management

The final paragraph focuses on the role of version control in tracking changes made during the change control process. It discusses the benefits of having built-in version control within applications or operating systems and the alternative of using third-party management systems to monitor and manage changes. The paragraph highlights the need to keep track of different versions of code, software, or configurations and the ability to revert to previous versions if necessary. It also emphasizes the importance of detailed documentation to maintain an accurate record of the system's state over time.

Mindmap

Keywords

💡Change Management

Change management is a systematic process for introducing changes into an organization's infrastructure, processes, or environment in a controlled and predictable manner. In the video, it is the overarching theme, emphasizing the need for a structured approach when implementing changes, especially in complex IT environments with numerous devices.

💡Technical Staff

Technical staff refers to the individuals with the necessary expertise to implement changes within a technical environment. The script discusses their role in executing change processes, such as updating software or modifying configuration files, which is crucial for maintaining system integrity and security.

💡Change Control Process

The change control process is a formalized procedure for evaluating, approving, and monitoring changes to a system. It is central to the video's narrative, highlighting the importance of having a clear and documented process to manage changes, ensuring they are made safely and within predefined parameters.

💡Allow List

An allow list, as mentioned in the script, is a security measure that specifies which applications or entities are permitted to function within an IT environment. It is part of the change control process, where technicians must decide which applications to include, thereby controlling what is allowed to run on workstations.

💡Deny List

A deny list is the counterpart to an allow list, identifying applications or entities that are explicitly prohibited from running. The script uses the concept of a deny list to illustrate how technicians can prevent the execution of known malicious software by adding it to the list, enhancing system security.

💡Vulnerabilities

Vulnerabilities are weaknesses in software or systems that can be exploited by attackers. The video discusses the role of technicians in identifying and addressing vulnerabilities, such as by updating deny lists to prevent the operation of applications with known security flaws.

💡Malware

Malware refers to malicious software designed to infiltrate, damage, or perform unauthorized actions on a computer system. The script mentions the importance of preventing malware infection by utilizing deny lists to block known malicious applications from executing within the IT environment.

💡Change Control Board

A change control board is a group responsible for reviewing, approving, or rejecting changes to a system as part of the change control process. The script describes how this board sets a specific scope for changes and schedules windows for their implementation, ensuring that changes are made in a controlled and predictable manner.

💡Downtime

Downtime in the context of the video refers to periods when a system or service is not available due to maintenance or updates. It is a critical consideration in the change control process, as IT professionals often schedule changes during non-production hours to minimize the impact on users.

💡Version Control

Version control is a system used to track and manage changes to documents or code. The script highlights the importance of version control in change management, allowing technicians to keep detailed records of changes, revert to previous versions if necessary, and maintain an up-to-date understanding of the system's configuration.

💡Dependencies

Dependencies in the script refer to the relationships between different applications or services where the installation or operation of one may require changes to another. This concept is important in change control as it adds complexity to the process, requiring technicians to consider and manage the interrelated nature of system components.

💡Legacy Applications

Legacy applications are older software systems that continue to be used, often because they are deeply integrated into an organization's operations. The video discusses the challenges of managing changes to these applications, which may no longer be supported by developers, and the importance of documenting them to ensure ongoing support.

💡Reboot

Rebooting, as mentioned in the script, is the process of restarting a computer system or service, which may be necessary after implementing certain changes. It is a common step in the change control process to ensure that new configurations or updates are properly loaded and functioning.

Highlights

Introduction to the change management process and its implementation by technical staff.

The complexity of making changes in environments with a large number of devices.

The role of technicians in the change control process and performing actual changes.

Explanation of allow and deny lists used for application control in IT environments.

The importance of adding malicious applications to deny lists for security.

Differences between allow and deny lists in terms of application restrictions.

The change control board's role in defining the scope of changes.

Limitations on technicians to only make changes listed in the change control document.

The possibility of making additional updates within the change control process if necessary.

The significance of having a well-documented change control process for scope changes.

The association of change control with potential downtime and its management.

Strategies for making changes during non-production hours to minimize impact.

Approaches to change control in 24/7 environments using primary and secondary systems.

The importance of monitoring changes and the ability to revert to previous configurations.

Communicating potential downtime to users through emails or a centralized calendar.

The process of rebooting systems as part of change control and its implications.

Challenges of making changes to legacy applications and the value of documentation.

Becoming an expert in legacy systems through documentation and understanding.

The impact of dependencies on the change control process and managing them.

The necessity of ongoing documentation in change management to keep information current.

The use of version control in managing different versions of code and configurations.

The benefits of built-in or third-party version control systems for tracking changes.

Transcripts

play00:01

In our previous video, we talked about the change management

play00:04

process.

play00:05

But of course, eventually, the actual change

play00:08

will need to be implemented into your environment.

play00:10

And that usually relies on the technical staff

play00:13

to be able to make these changes.

play00:15

When you're making changes to one or two devices at home,

play00:17

it's a relatively straightforward process.

play00:20

But when you're working in an environment with tens,

play00:22

hundreds, or even thousands of devices,

play00:25

what would be a very simple update for a single device

play00:28

can turn into a very complex process.

play00:31

So in this video, let's talk about the change control

play00:33

process from the perspective of the technician.

play00:36

The change control process itself

play00:38

is one that is concerned with what needs to change.

play00:41

But of course, the technician is the one

play00:43

who will be actually performing these changes.

play00:46

For example, a technician may be asked

play00:49

to make a change to an allow list or a deny list.

play00:52

These are lists that are commonly

play00:54

used to allow or prevent certain applications from working

play00:57

in your environment.

play00:58

This is because certain applications

play01:00

can be considered dangerous.

play01:01

These applications might have known vulnerabilities

play01:04

or perhaps they're well-known applications

play01:07

for carrying malware and infecting other systems.

play01:10

It would make sense, then, for a technician

play01:12

to add those malicious applications to a deny list

play01:15

or perhaps include only the applications that they'd

play01:19

like to run to an allow list.

play01:21

If you're managing an allow list,

play01:23

this means that only the applications you've named

play01:26

will be able to run on people's workstations.

play01:29

Everything is restricted except the things

play01:31

that you add to the allow list.

play01:34

A deny list is a little bit more flexible,

play01:36

in that you could run any application you'd like,

play01:39

except for the applications that have been specifically named

play01:43

on the deny list.

play01:44

For example, it's common to think

play01:45

of antivirus and anti-malware as being a very large deny list.

play01:50

Everything can run on your system

play01:52

except specific types of code that are

play01:54

identified by the anti-malware.

play01:57

When a change is submitted to a change control board,

play02:00

there's a very specific documented scope

play02:03

for making this change.

play02:04

And as part of this change control,

play02:06

you're limited to only making changes

play02:09

to what is specifically listed in the change control document.

play02:12

For example, a change control board

play02:14

may schedule a two-hour window for you

play02:16

to be able to upgrade a series of printer drivers.

play02:19

But that doesn't mean, during that same two-hour period,

play02:22

that you can make other changes to other applications

play02:25

just because the window happens to be available.

play02:28

However, this doesn't mean that you're

play02:29

limited to only what is listed in the change control

play02:32

documents.

play02:33

There may be times where you have to make additional updates

play02:36

or expand the scope to be able to complete the primary goal

play02:40

of that particular change.

play02:42

For example, you may find that the process of upgrading

play02:45

those printer drivers requires a modification to a configuration

play02:48

file on everyone's system.

play02:50

And although that wasn't specifically written

play02:53

as part of the scope of this change,

play02:55

this change can only take place if you make that modification.

play02:59

And if this is a relatively simple modification,

play03:01

there may be policies in place that

play03:03

allow you to make the decision to modify that

play03:06

file so that you can complete the overall change control

play03:09

process.

play03:10

This is why it's important to have a well-documented change

play03:13

control process so that everyone understands the procedures that

play03:17

should occur if you need to change the scope of the change

play03:20

control.

play03:21

When most people hear the term change control,

play03:24

they automatically think about downtime.

play03:26

And although this doesn't necessarily

play03:29

mean that there will be downtime during the change,

play03:31

we very often set aside a certain range to tell people

play03:35

that there might be some unavailability

play03:37

during this particular window.

play03:39

This is one of the reasons as an IT professional

play03:42

we tend to make these changes during non-production hours.

play03:45

So the overnight hours or times when people are not

play03:48

working on a particular application

play03:50

would be a perfect time to make any type of significant change

play03:54

to the application.

play03:55

If you work for an organization that is up and running 24/7,

play03:59

then you may find it very difficult

play04:01

to find a change control window where downtime is tolerated.

play04:04

In those environments, it's probably

play04:06

more common to have a system where

play04:08

you could switch to a secondary system,

play04:10

update the primary system, and then switch over seamlessly

play04:14

to prevent any type of downtime.

play04:16

This move between a primary and secondary system

play04:20

is probably one that's relatively automated

play04:22

so that it can make that change as quickly as possible.

play04:25

This also allows you to monitor the change.

play04:28

And if you notice that there are problems,

play04:30

you can switch back to the secondary system,

play04:32

which at this point, you haven't made any changes to.

play04:35

This makes it very easy to fall back

play04:37

to a previous configuration by simply pointing

play04:40

all of your users to either the primary

play04:42

or the secondary system.

play04:43

And of course, if there could be downtime,

play04:46

you need to be sure that everyone

play04:47

is aware of any potential outages that

play04:50

may occur during that window.

play04:51

It's common to send out emails informing everyone

play04:54

of this particular downtime.

play04:56

Or you could have a centralized change control calendar

play04:58

where people can proactively view

play05:00

what may be happening at any particular time of the day.

play05:04

If you've been part of implementing

play05:06

one of these change controls, one

play05:07

of the things that you probably had

play05:09

to do just before bringing everything back online

play05:12

is to reboot the system.

play05:14

This may be required by the change.

play05:16

You may have a new configuration that will only be implemented

play05:19

if you restart the system.

play05:20

This may require rebooting the operating system itself

play05:23

or, if you're in front of the physical device,

play05:25

you may be able to physically power it down and power it

play05:28

back on again.

play05:28

Or this may only require you stopping and restarting

play05:32

a service that's running in that operating system.

play05:34

This also helps you understand if this system is going

play05:37

to be able to recover properly if there

play05:39

happens to be a power outage.

play05:41

But if you're rebooting the system as part of your change

play05:44

control, you'll know exactly how that system will react if it

play05:47

happens to need a power cycle.

play05:49

If the documentation says that we only

play05:52

need to stop and restart a service,

play05:54

this can usually be done relatively quickly.

play05:56

We can do this from the Windows Services; from Task Manager

play06:00

inside of Windows; or if it's Linux,

play06:02

we may be able to restart a daemon that's already

play06:04

running in the background.

play06:06

And if we're updating an executable that's on a system,

play06:08

we may require our users to log out of that application,

play06:12

completely close down and exit the app,

play06:14

and then restart it with the updated application.

play06:18

One challenging aspect of this change control process

play06:21

is when you're making a change that could affect a legacy

play06:24

application.

play06:25

Legacy applications have usually been

play06:27

running for a very long time, and there are no current plans

play06:30

to change out this particular app.

play06:32

To add additional complexity, it's

play06:34

very common for these legacy applications

play06:36

to no longer be supported by the developer-- assuming,

play06:40

of course, that the developer is even still in business.

play06:43

These are usually the systems with a sign that

play06:45

says, don't make any changes to this system

play06:48

because no one in the organization

play06:50

understands the application or how to support

play06:52

any aspect of this system.

play06:55

However, you may find that this application is not as complex

play06:58

as you may have first thought, and by documenting

play07:00

the application and how it's installed onto the system,

play07:03

you can bring it into the normal support

play07:05

cycle for your organization.

play07:07

This doesn't necessarily mean that the support for this app

play07:10

becomes seamless because there may be some idiosyncrasies that

play07:14

are specific to this older application running on an older

play07:17

operating system.

play07:18

You'll find that after documenting these systems

play07:21

and understanding how they work just a little bit better,

play07:23

you'll become the expert in this system

play07:25

and everyone in your organization

play07:27

will be able to now support that system a little bit better.

play07:31

If you've ever had to manage a large scale operating

play07:33

system that is providing services

play07:35

for hundreds or thousands of people,

play07:37

then you know that making a simple upgrade

play07:39

can sometimes be complicated because of dependencies.

play07:43

With dependencies, you have to first make a change

play07:46

to one application or service before you're

play07:49

able to install or update another application or service.

play07:53

Or it may be that the service that you've installed

play07:56

won't work until a secondary service is also

play07:59

installed on that system.

play08:01

This certainly complicates the change control process.

play08:04

We thought we were updating and changing one application,

play08:07

and now we have to update a number of different services

play08:10

just to provide the original update.

play08:13

And in some cases, the dependencies

play08:15

may not even be on the same system.

play08:17

For example, to be able to install

play08:19

a new version of your firewall management software,

play08:22

it may also require your firewalls

play08:24

to be running at a new version of code.

play08:26

So you would first have to update all of your firewalls,

play08:29

and then you would need to update the firewall management

play08:32

software.

play08:34

With change control, it's certainly true

play08:36

that the only constant is change.

play08:38

You might have change control processes

play08:40

occurring in your data center every week

play08:42

or perhaps even every day.

play08:44

And every change has something that has now been

play08:47

modified to what it was before.

play08:49

This means that any documentation you have

play08:52

of your environment could very quickly be out of date

play08:55

without some type of ongoing documentation process.

play08:58

That's why we commonly see documentation being required

play09:02

with the change management process

play09:04

itself so that you are always creating the most updated

play09:07

set of documentation for your network.

play09:10

This might include updating diagrams or charts that

play09:13

have a network configuration.

play09:15

You might have to modify IP addresses

play09:17

or different configurations or you

play09:19

may have to list a new series of processes or procedures

play09:22

for managing a brand-new application that

play09:25

has been upgraded in your production network.

play09:28

And if you're dealing with change control,

play09:30

then you're probably also dealing

play09:31

with different versions of code, software, or configurations

play09:35

that need to be applied to these systems.

play09:38

In these situations, it's very useful

play09:40

to have some way to keep track of all

play09:42

of these different versions that have been installed.

play09:45

And this also might give you a way

play09:46

to revert to a previous version if you run into problems.

play09:50

Many times, we provide this functionality

play09:52

through version control.

play09:53

This allows us to keep detailed documentation on things

play09:57

like changes to router configurations,

play09:59

patches inside of the Windows operating system,

play10:02

changes to registries when you're updating an application,

play10:05

and anything else where you can track what happens

play10:08

between point A and point B.

play10:11

You may find that the applications or operating

play10:13

systems that you're using already

play10:15

have some type of version control built in,

play10:17

and there might be a very easy way within that application

play10:20

or operating system to click a button, make a change,

play10:24

and suddenly you're running a different version.

play10:26

If your application or operating system

play10:28

doesn't integrate any type of version control,

play10:31

you might want to install a third party version control

play10:34

management system so that you can manage all of your systems

play10:37

and know exactly when changes are made

play10:40

and what those changes are doing.

Rate This

5.0 / 5 (0 votes)

Related Tags
Change ManagementTechnical StaffIT EnvironmentDevice UpdatesSecurity ListsAllow ListDeny ListChange Control BoardSystem DowntimeLegacy ApplicationsVersion Control