Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

AI6.2 - Impact Assessment, Prioritisation and Authorisation

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective AI6.2 - Impact Assessment, Prioritisation and Authorisation is contained within Process Popup Manage Changes.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
14 Members
0 Online
4761 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Impact Assessment, Prioritisation and Authorisation

Assess all requests for change in a structured way to determine the impact on the operational system and its functionality. Ensure that changes are categorised, prioritised and authorised.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • An agreed-upon and standardised approach for assessing impacts in an efficient and effective manner
  • Formally defined change impact expectations based on business risk and performance measurement
  • Consistent change procedure
  Risk Drivers
  • Unintended side effects
  • Adverse effects on capacity and performance of the infrastructure
  • Lack of priority management of changes

View Control Practices  help

Hide Control Practices  help

  1. Develop a process to allow business process owners and IT to request changes to infrastructure, systems or applications. Develop controls to ensure that all such changes arise only through the change request management process.
  2. Categorise all requested changes (e.g., infrastructure, operating systems, networks, application systems, purchased/packaged application software).
  3. Prioritise all requested changes. Ensure that the change management process identifies both the business and technical needs for the change. Consider legal, regulatory and contractual reasons for the requested change.
  4. Assess all requests in a structured fashion. Ensure that the assessment process addresses impact analysis on infrastructure, systems and applications. Consider security, legal, contractual and compliance implications of the requested change. Consider also interdependencies amongst changes. Involve business process owners in the assessment process, as appropriate.
  5. Ensure that each change is formally approved by business process owners and IT technical stakeholders, as appropriate.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 11 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 924 days ago
Downloads
Posted by ISACA 1435 days ago
Books
Posted by ISACA 1467 days ago
Research
Posted by ISACA 1724 days ago

Events & Online Learning: 1 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 38 total

Volume 3, 2018
by Jen Hajigeorgiou, Editor
The ISACA Journal has a proud tradition of serving our community for more than 40 years, evolving to meet the needs and interests of practitioners amid the ever-changing technology landscape.
Volume 3, 2018
by Yuri Bobbert, CISM, CISA, SCF, and Talitha Papelard-Agteres, CISM
Understanding the key factors that influence effective BIS is crucial for business leaders; otherwise, security problems can occur, which can lead to financial loss, unavailability, reputational damage or even bankruptcy.
Volume 2, 2018
by Steven J. Ross, CISA, CISSP, MBCP
In this era of multi-modal technology, many disaster recovery issues are solved, some are simply transferred and a few are made worse.
Volume 2, 2018
by Ray Cheung, CISA, CITP, CPA, Vikas Sharma, CISA and Bhupinder Singh, CISA, CISM, ITIL v3, PMP, QSA
It is no surprise that many enterprises, ranging from early start-ups to mature global enterprises, have considered or implemented a migration to Amazon Web Services’ (AWS) cloud computing services.
Volume 1, 2018
by Chris Poulin
While today everyone worships their smartphones as if the device itself demands their constant and public attention, there’s a new transformative technology that’s even more pervasive...
Volume 1, 2018
by Ian Cooke, CISA, CGEIT, CRISC, COBIT Assessor and Implementer, CFE, CPTE, DipFM, ITIL Foundation, Six Sigma Green Belt
Innovative technologies such as VMs and the cloud help the efficiency and effectiveness of backup and recovery plans, but they do not replace the need to plan, document, or test and test again.

Wikis: 2 total

Blog Posts: 8 total

“Enterprise architecture is now a strategic componentof every forward-thinking organization around the world.”Source: http://feapo.org/press-release-ea-perspectives-white-paper/ Related Article: Common Perspective on Enterprise Architecture: http://feapo....
Posted By : SA | 1 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments
Enterprise Architecture (EA) is about holistic understanding of the enterprise including the business side. I had to stress on the business side as sometimes the EA is taken as IT Architecture. EA is a combination of IT and Business Architectures. It take...
Posted By : SA | 0 comments
28 Jan 2014
Welcome to my blog which will be dedicated to views and discussions on Enterprise Architect (EA) and Business-IT Alignment (BITA). I encourage the colleagues to join the ISACA topic group for "Strategic Planning/Alignment" for initiating and promoting...
Posted By : SA | 0 comments