6 Steps for Ensuring Continuous Compliance in a Complex, Hybrid IT Environment

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next 6 Steps for Ensuring Continuous Compliance in a Complex, Hybrid IT Environment-6 Next

Change Requests

Create a well-defined process for change requests.

Many companies are adopting methodologies like DevOps, where changes to applications are pushed out very rapidly. It's often the case where application updates require modifications to the network configuration, and these changes happen quickly to keep pace with business. When the network is "clean" (i.e., fully compliant with policy), that's the right time to assess the change requests and control processes, as well as the impact they will have. This is also the time to recertify that the network is maintaining its state of continuous compliance. The recertification process includes evaluating change requests against the security policy to make sure the requested configuration change doesn't cause a policy violation. Your change control process should include workflow documentation of precisely what changes are made, for what business purpose, and at whose request (also known as "full accountability"). The documentation needs to include sufficient comments so that compliance auditors can know what happened and why. This documentation is critically important if problems arise – or worse, in the event of a cyber attack --and the origins of changes need to be traced.

CISOs and their network security teams are under increasing pressure to adhere to an expanding "alphabet soup" of regulatory requirements that have a direct impact on the enterprise network. On top of that, every business has its own internal policies and best practice workflows to follow. One way to reduce the compliance enforcement and audit-readiness burden is to work toward the goal of continuous compliance — attaining a state where all compliance requirements are met, and then continuously maintaining that state.

Even with the many challenges of managing today's complex IT environment, it's possible to achieve continuous compliance through proper organization, thorough processes and technology automation. In this slideshow, Ellen Fischl Bodner, Tufin, has identified six steps that are critical to ensuring continuous compliance.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

IT_Man88-190x128 Top 5 Trends Affecting Women-Owned Micro Businesses

Learn more about the challenges and opportunities presented to women leaders, especially micro-business owners. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.