You are on page 1of 5

Information System Programming Management Controls:

1. Access Controls: Access controls are measures put in place to manage and restrict access to
information system resources based on user roles and permissions. These controls include
authentication mechanisms, user account management, and authorization protocols to ensure that only
authorized individuals can access and modify the system.

2. Change Management: Change management controls govern the process of making changes to the
information system, including software updates, patches, and system configurations. It involves
documentation, testing, and approval procedures to minimize disruptions and ensure that changes are
implemented smoothly and securely.

3. Data Backup and Recovery: Data backup and recovery controls involve regularly creating copies of
critical system data and implementing procedures to restore data in case of data loss or system failures.
These controls aim to protect against data loss, ensure business continuity, and minimize downtime.

4. Incident Response: Incident response controls establish procedures for detecting, analyzing, and
responding to security incidents or system disruptions. This includes incident reporting, incident
handling, and investigation processes to mitigate the impact of incidents and prevent future
occurrences.

5. Security Monitoring: Security monitoring controls involve the continuous monitoring of system
activities, logs, and network traffic to identify and respond to security threats or unauthorized activities.
Intrusion detection systems, log analysis tools, and security information and event management (SIEM)
systems are used to detect and respond to security incidents.

6. Configuration Management: Configuration management controls ensure that the information


system's hardware, software, and network components are properly configured, maintained, and
updated. This involves managing system configurations, version control, and ensuring compliance with
standards and best practices.
7. Risk Assessment and Management: Risk assessment and management controls involve identifying and
assessing potential risks to the information system's security and functionality. This includes conducting
risk assessments, implementing risk mitigation strategies, and monitoring the effectiveness of controls
to minimize risks.

8. Documentation and Policies: Documentation and policy controls involve creating and maintaining
comprehensive documentation of system architecture, processes, and procedures. This includes security
policies, user guidelines, and operational manuals to provide guidance and ensure consistency in system
management and usage.

Please note that the above information is a summary and should be used for informational purposes
only. For detailed and accurate information, it is advisable to refer to authoritative sources and research
papers on information system programming management controls.

Sure. Here are some notes on information system programming management controls in GIS:

* **Data access controls:** These controls restrict who can access data and what they can do with it.
They can be implemented at the database level, the application level, or the user level.

* **Data backup and recovery:** These controls ensure that data can be restored in the event of a loss
or corruption. They typically involve backing up data to a separate location on a regular basis.

* **Data security:** These controls protect data from unauthorized access, modification, or destruction.
They can include things like password protection, encryption, and firewalls.

* **Change management:** These controls ensure that changes to the GIS system are properly
controlled and documented. They can include things like a change management process, a change
control board, and a change log.

* **Version control:** These controls track changes to the GIS data and software. They can be used to
revert to a previous version of the data or software if necessary.

* **Auditing:** These controls track user activity in the GIS system. They can be used to identify
unauthorized access or modifications to the data.
These are just some of the information system programming management controls that can be
implemented in GIS. The specific controls that are implemented will depend on the specific needs of the
organization.

Here are some additional considerations when implementing information system programming
management controls in GIS:

* **The sensitivity of the data:** The more sensitive the data, the more stringent the controls need to
be.

* **The size of the organization:** The larger the organization, the more complex the controls need to
be.

* **The budget:** The cost of implementing and maintaining the controls needs to be considered.

I hope this helps! Let me know if you have any other questions.

Notes on Information System Programming Management Controls in GIS:

1. Version Control: Implement version control systems, such as Git, to manage the source code and track
changes made to GIS software. This allows for collaboration, code sharing, and easy rollbacks if issues
arise. Source: Atlassian. (n.d.). Git Tutorial. Retrieved from
https://www.atlassian.com/git/tutorials/what-is-version-control

2. Change Management: Establish a formal change management process to control modifications to the
GIS software. This involves documenting and reviewing proposed changes, assessing their impact, and
implementing them through proper channels. Source: Microsoft. (n.d.). Change Management Process
Overview. Retrieved from https://docs.microsoft.com/en-us/azure/devops/migrate/plan/overview?
view=azure-devops-2020

3. Testing and Quality Assurance: Develop a comprehensive testing strategy to ensure the reliability and
functionality of GIS software. This includes unit testing, integration testing, and user acceptance testing.
Implement quality assurance processes to identify and rectify software defects. Source: Pressman, R. S.
(2005). Software Engineering: A Practitioner's Approach. McGraw-Hill.
4. Documentation: Maintain thorough documentation for GIS software development and programming.
This includes documenting code, APIs, data structures, algorithms, and any customizations made to the
software. Well-documented systems facilitate understanding, troubleshooting, and future
enhancements. Source: Bassil, Y., & Pottier, R. (2015). Documentation for Software Engineers. Morgan &
Claypool.

5. Security: Implement security measures to protect GIS software and data from unauthorized access
and cyber threats. This includes secure coding practices, user access controls, encryption, and regular
security audits. Source: OWASP. (n.d.). OWASP Top Ten Project. Retrieved from
https://owasp.org/www-project-top-ten/

6. Configuration Management: Employ configuration management practices to control and track


changes made to software configurations. This includes managing software versions, libraries,
dependencies, and environment settings. Source: IEEE. (2004). IEEE Standard for Configuration
Management in Systems and Software Engineering (IEEE Std 828-2004).

7. Project Management: Apply project management principles to GIS software development. This
involves defining project scope, setting milestones, allocating resources, and managing timelines.
Effective project management ensures timely delivery and coordination among team members. Source:
PMI. (2017). A Guide to the Project Management Body of Knowledge (PMBOK Guide). Project
Management Institute.

8. Compliance: Ensure compliance with legal, regulatory, and industry standards when developing GIS
software. This includes data privacy regulations, licensing requirements, and relevant GIS data
standards. Source: ISO. (n.d.). ISO/IEC 19770-1:2017 Information Technology - Asset Management - Part
1: Processes, requirements and guidance. Retrieved from https://www.iso.org/standard/69076.html

By implementing these information system programming management controls in GIS, organizations can
maintain efficient, secure, and well-documented GIS software that meets the needs of users and
stakeholders.

Sources:
- Atlassian. (n.d.). Git Tutorial. Retrieved from https://www.atlassian.com/git/tutorials/what-is-version-
control

- Microsoft. (n.d.). Change Management Process Overview. Retrieved from


https://docs.microsoft.com/en-us/azure/devops/migrate/plan/overview?view=azure-devops-2020

- Pressman, R. S. (2005). Software Engineering: A Practitioner's Approach. McGraw-Hill.

- Bassil, Y., & Pottier, R. (2015). Documentation for Software Engineers. Morgan & Claypool.

- OWASP. (n.d.). OWASP Top Ten Project. Retrieved from https://ow

You might also like