Ascent Portal Staff
Tips On The Management of Operational Software
When software is installed on information systems, it is important that it is controlled to help ensure compliance is maintained with licensing and copyright limitations.
New vulnerabilities in the operational software should be screend and identified for operating systems, software applications, and firmware daily. Organizations need to know what software is installed within their environments in order to ensure it remains secure and updated with patches or other flaw remediation. When doing so it is important to look out for two things specifically, documented procedure and file sharing safety.
Procedure
Procedures should be developed and implemented to control the installation of operational software on information systems within your organization’s environment. Software, along with associated documentation, should be used in accordance with contractual end user license agreements and copyright laws. The use of software protected by quantity licenses should be tracked. Copying and distribution of software should be authorized in advance. Compliance with software installation controls should be reviewed and assessed at least quarterly.
File Sharing Saftey
In the age of remote work, file sharing safety is even more important. The use of peer-to-peer file sharing technology should be controlled and documented to ensure that this functionality is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work. Your organization should control the websites or categories of web sites personnel are permitted to visit on their work technology. The unauthorized viewing of copyrighted work, such as movies, from your organization’s network can create significant issues, including regulatory fines or legal action. Similar requirements should be applied to software developed internally by your organization.
Overall, managing various versions of software can become a very tedious, error-prone exercise without extensive, documented records and safety protocol. To keep your organization safe, personale should consistently be aware of where your software is installed, the different versions of code that have been deployed, and any coding errors or software bugs that still need to be remediated.
To learn more about this issue, and 99 more, get my book: 100 Security Program Pitfalls and Prescriptions to Avoid Them (available on Amazon here). Or register for a demo of the ASCENT Security and Compliance Portal and get a free synopsis of the 100 Security Program Pitfalls eBook today.
See the ASCENT Security and Compliance Portal and get a free synopsis of the 100 Security Program Pitfalls eBook today.