Skip to main content

๐Ÿ’ผ 18 Implementation of controls - Security in change management

  • Contextual name: ๐Ÿ’ผ 18 Implementation of controls - Security in change management
  • ID: /frameworks/apra-cpg-234/18
  • Located in: ๐Ÿ’ผ APRA CPG 234

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-d6060102

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 47 APRA envisages that a regulated entity would implement controls to manage changes to information assets, including changes to hardware, software, data, and configuration (both where the change is planned and in response to an emergency) with the aim of maintaining information security.7
ย ย ย ย ๐Ÿ’ผ 47a security testing (including reviews) to identify vulnerabilities and confirm information security requirements have been met. The nature of testing would be commensurate with the scope of the change and the sensitivity and criticality of the impacted information asset (refer to Attachment H for examples of common testing techniques);
ย ย ย ย ๐Ÿ’ผ 47b approval of changes prior to deployment into the production environment;
ย ย ย ย ๐Ÿ’ผ 47c segregation of duty controls which prevent personnel from deploying their own software changes to production;55
ย ย ย ย ๐Ÿ’ผ 47d changes are developed and verified in another environment, sufficiently segregated from production so as to avoid any compromise of information security;
ย ย ย ย ๐Ÿ’ผ 47e information security requirements are validated prior to deployment;
ย ย ย ย ๐Ÿ’ผ 47f desensitising sensitive production data when used for development or testing purposes;
ย ย ย ย ๐Ÿ’ผ 47g intentionally introduced information security vulnerabilities are authorised. In APRAโ€™s view, changes that knowingly introduce security vulnerabilities would be minimised and, where possible, compensating controls implemented. This situation normally arises when dealing with system outages.