<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Procedures contents in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48779#M563</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi All&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I’m preparing a Change Control Procedure for my company. I’m just wondering if it is appropriate to add a “&lt;STRONG&gt;&lt;EM&gt;Scope&lt;/EM&gt;&lt;/STRONG&gt;” to specify what is in scope and what is not? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Some of the scopes include the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;In scope&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Software&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: installation, patch, upgrade or remove software, including off-the-shelf applications, OS and in-house developed applications.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Database&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: changes to DB structure&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Hardware&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: Installation or modification of computing equipment and services&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Out of scope&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Desktop&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: installing a Bluetooth mouse, changing the Windows system’s language interface, etc.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Daily administration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: reset user password, modification of user roles and security groups.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I appreciate any help you can provide.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Dec 2021 04:06:49 GMT</pubDate>
    <dc:creator>2912</dc:creator>
    <dc:date>2021-12-28T04:06:49Z</dc:date>
    <item>
      <title>Security Procedures contents</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48779#M563</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi All&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I’m preparing a Change Control Procedure for my company. I’m just wondering if it is appropriate to add a “&lt;STRONG&gt;&lt;EM&gt;Scope&lt;/EM&gt;&lt;/STRONG&gt;” to specify what is in scope and what is not? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Some of the scopes include the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;In scope&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Software&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: installation, patch, upgrade or remove software, including off-the-shelf applications, OS and in-house developed applications.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Database&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: changes to DB structure&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Hardware&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: Installation or modification of computing equipment and services&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Out of scope&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Desktop&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: installing a Bluetooth mouse, changing the Windows system’s language interface, etc.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;Daily administration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;: reset user password, modification of user roles and security groups.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I appreciate any help you can provide.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 04:06:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48779#M563</guid>
      <dc:creator>2912</dc:creator>
      <dc:date>2021-12-28T04:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Security Procedures contents</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48788#M564</link>
      <description>&lt;UL&gt;&lt;LI&gt;Does your company have any docs in-between a policy and procedure related to change management (CM)?&lt;/LI&gt;&lt;LI&gt;Is the CM procedure mostly viewed by the technology staff/admins if they have questions on what to do if they receive a CM request?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Me personally, I keep Policy short with pointers to a Standards doc and Procedures doc. The Standards doc is where I'd put the detailed list of what's either in scope or out of scope and I can change it as often as needed. Some Orgs don't have anything in-between and if that's the case here, place it in the procedure doc because you wouldn't want to go through all the admin hurdles of updating policy to make minor changes to the list.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 17:00:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48788#M564</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-12-28T17:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security Procedures contents</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48794#M565</link>
      <description>&lt;P&gt;Hi tmekelburg1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your advice. We have a policy and procedures in place, but no other doc in between. I'll put the scope in the procedure file as suggested by you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Dec 2021 02:30:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Security-Procedures-contents/m-p/48794#M565</guid>
      <dc:creator>2912</dc:creator>
      <dc:date>2021-12-29T02:30:16Z</dc:date>
    </item>
  </channel>
</rss>

