Abstract
The relevance of managing the enterprise information infrastructure, including the introduction of new modules into the existing architecture, is governed by the necessity to ensure a high degree of information protection and to improve the business process efficiency. 
 The article discusses modelling and implementing a new product design coordination module at several levels of a small enterprise’s infrastructure. Specific methods for managing the built infrastructure include business process automation, vulnerability analysis, information security, monitoring and managing changes. Examples of infrastructure management at different levels are considered, as well as the methods for implementing a new module and controlling it based on standards. To create a new module, a model development was carried out at the hardware level, which made it possible to optimise the system structure and reduce the load on the servers. Such standards as GOST R ISO / IEC 27001-2013 and GOST R ISO / IEC 27002-2015 were used, which ensured the security and protection of company data, as well as the Meta Object Facility (MOF) standard was applied, which made it easy to integrate the new module into the existing infrastructure. The study results show that introducing a new module can improve the enterprise’s information infrastructure, reduce the time for approval and improve the product quality, as well as decrease the likelihood of errors and information leaks and diminish the enterprise’s costs. It is recommended to use ISO/IEC and ITIL standards for efficient management of the enterprise’s information infrastructure.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.