Page 6 - Courses
P. 6

IT Change Management — IT Certificate

            Understanding Change Management

            Change management is the systematic set of processes that are executed within an organization’s IT
            function to manage enhancements, updates, installations, implementations, incremental fixes, and
            patches to production systems. Changes may include (but are not limited to):

              Application code revisions.

              System upgrades (e.g., applications, operating systems, and databases).

              Infrastructure changes (e.g., servers, cabling, routers, and firewalls), including on-premise, cloud,
               and mobile.

              Security patches/updates (e.g., correcting known security vulnerabilities in hardware, software,
               applications, and databases).

            Change management also can be described as a consistent and understood process used to
            minimize disruption while modifying the IT environment. Typical activities that can be managed
            through the change management process include:

              Addition or deletion of hardware and software.

              Code modifications or revisions.

              Configuration changes to existing hardware.


              Regular system updates or patches.

              Data modifications (e.g., restoring from backup).

            Generally, effective change management can assist an organization in addressing risk, reducing
            unplanned work, limiting unintended results, and ultimately improving the quality of service for
            internal and external customers.

            Benefits of Effective Change Management

            Organizations with effective change management require fewer system administrators, and the
            effectiveness and productivity of IT personnel is increased. When change management is operating
            effectively, IT personnel are better equipped to:

              Upgrade software and applications regularly, improving the overall security and functionality of
               systems.

              Update systems in compliance with regulatory standards.

              Protect systems from cybersecurity incidents.


              Operate in a continuous integration/deployment environment.


            Copyright © 2020 by The Institute of Internal Auditors, Inc. All rights reserved.
   1   2   3   4   5   6   7   8   9   10   11