Ad
related to: 5 functions of configuration management pdf
Search results
Results From The WOW.Com Content Network
Top level Configuration Management Activity model. Configuration management (CM) is a management process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.
[5] [6] ANSI/EIA-649, along with all updated versions to this standard, defines and explains the five primary functions or elements of configuration management: CM Planning, Configuration Identification, change management, status accounting, and verification & audit. [1] [7] [8] [9] [10]
Software configuration management (SCM), a.k.a. software change and configuration management (SCCM), [1] is the software engineering practice of tracking and controlling changes to a software system; part of the larger cross-disciplinary field of configuration management (CM). [2]
ISO 10007 "Quality management — Guidelines for configuration management" is the ISO standard that gives guidance on the use of configuration management within an organization. [1] [2] "It is applicable to the support of products from concept to disposal." [3] The standard was originally published in 1995, and was updated in 2003 and 2017.
Security management functions include managing network authentication, authorization, and auditing, such that both internal and external users only have access to appropriate network resources. Other common tasks include the configuration and management of network firewalls, intrusion detection systems, and security policies (such as access lists).
The term "configuration item" can be applied to a product, allocated component of a product, or both that satisfies an end use function, has distinct requirements, functionality and/or product relationships, and is designated for distinct control in the configuration-management system. Configuration items and their associated product ...
CMDBs can be used for many things, including but not limited to: business intelligence, software and hardware builds, inventory, [4] impact analysis for change management, [5] and incident management. In the context of ITIL, the use of CMDBs is as part of infrastructure operations and support. The CMDB represents the authorized configuration of ...
In the process of performing configuration management, configuration items (or work products) may be assigned a baseline so as to establish them as having a certain status. In this sense, to baseline a work product may require certain change(s) to the work product to ensure it conforms to the characteristics associated with the baseline referenced.