Skip to content

Instantly share code, notes, and snippets.

@opexxx
Created September 11, 2024 20:23
Show Gist options
  • Save opexxx/86600119752dc7858a9e984e02d172cf to your computer and use it in GitHub Desktop.
Save opexxx/86600119752dc7858a9e984e02d172cf to your computer and use it in GitHub Desktop.
Configuration Management Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
1st Reviewer / Review Date
2nd Reviewer / Review Date
Approver (CEO) / Approval Date
Release Date
Next Review

Executive Summary

Purpose of this document

This document describes how services provided by third parties will be monitored and reviewed.

Areas of the standard addressed

The following areas of the ISO/IEC 27001 standard are addressed by this document:

  • A.5 Organizational controls
    • A.5.1 Policies for Information security
  • A.8 Technological controls
    • A.8.9 Configuration management

1. Introduction

Company Name uses a wide variety of components in creating and running its information systems infrastructure. These consist of hardware, software, cloud services and networks and all are potentially vulnerable to attack from threats from different sources. In order to lessen the risk of these components becoming compromised, it is important that we identify the most appropriate ways of configuring them and then ensure that these methods are used throughout our platform landscape.

This policy describes the main principles on which such standard configurations must be based and sets out the rules for their use.

This control applies to all systems, people and processes that constitute the information systems, including board members, directors, employees, suppliers and other third parties who have access to the information systems.

The following policies and procedures are relevant to this document:

  • Information Security Policy
  • Mobile Device Policy
  • Network Security Policy
  • Cloud Services Policy
  • Configuration Management Process
  • Change Management Process

2. Policy

New components that make up the information systems hardware, software, services and networks must have their required security settings defined and correctly configured prior to their implementation within our platform environment.

Configurations of existing components must be reviewed periodically to ensure they meet the requirements of this policy.

Such components will include, but are not limited to:

  • Endpoint devices, such as desktops, laptops, mobile phones and tablets
  • Physical network devices, such as routers, switches and firewalls
  • Physical servers, including system software such as operating systems, databases and web servers
  • Cloud infrastructure, such as virtual servers, networks and storage

Where possible, standard templates will be used to document the required configuration of platform components. These templates will be subject to change and version control.

The configurations defined will take appropriate account of available sources of information about securing the relevant components, such as vendor templates, guidance from cyber security authorities and best practice organizations, system hardening guides and our own information security policies.

Details of configuration standards will be protected as sensitive information which would be of use to an attacker.

Configuration standards must be reviewed on a regular basis and kept up to date with changes in the components themselves (such as new hardware or software versions) and the threats and vulnerabilities they face.

The correct configuration of components will be monitored and instances where existing settings deviate from the established standard will be investigated and, if necessary, corrected.

Where feasible, automated software methods such as Infrastructure as Code (laC) will be used to create com ponents with the correct configuration. Automated audit tools may also be used to check configurations regularly and report on and correct those found to be noncompliant.

Table of Contents


Briefing Sheet

Target Audience This Policy is intended to be understood and applied by all employees.
Implementation Timing / Impact Describe when the policy enters into force.
Assumptions / Prerequisites Describe if any.
Exception Management Describe if needed.

History of Revisions

Version Date Description Revised by
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment