The entire process that Figure 8.11 shows is intended to "snap in" to the "Develop Change" task
shown in most of the other processes. This process is simply an expansion of that one task into a
more formal process.
A major security and operational benefit of template-based configuration is consistency. Device
configuration options that aren't changed frequently (such as permissions) aren't always known
to every member of the IT staff; by requiring device configurations to be template-based, these
critical areas of the configuration can be determined ahead of time and more easily enforced in
new and updated device configurations. Administrators no longer need to remember the correct
security permissions for a device; the template simply has them built-in so that they're always
Figure 8.12 shows a sample audit process. This process is intended to be conducted apart from
the primary change and configuration management process, and serves as a form of double-
check to ensure that the process is being followed.
Figure 8.12: Sample audit process.
Chapter 8 The entire process that Figure 8.11 shows is intended to "snap in" to the "Develop Change" task shown in most of the other processes.